Skip to content

snapdowgg/HTTP-Flood

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HTTP GET Flood Preview:

image

Overview

This project is a simple HTTP GET flood tool written in Go.

It continuously sends randomized HTTP GET requests to a specified target within a defined duration.
The tool uses random query parameters, rotating user-agents, and spoofed referers to simulate multiple client requests.

⚠️ This project is intended strictly for educational purposes and authorized security testing only.


Proof of Concept (PoC)

image

Features

  • Concurrent HTTP GET requests using goroutines
  • Random query parameter generation (cache bypass)
  • Randomized User-Agent header
  • Randomized Referer header
  • Custom duration control
  • Graceful stop with CTRL+C
  • Lightweight and fast execution

Requirements

  • Go 1.18+
  • Dependencies:
    • github.com/corpix/uarand
    • github.com/gookit/color

Install dependencies:

go mod init 
go get github.com/corpix/uarand
go get github.com/gookit/color

Usage

go run socket.go --host https://example.com --time 30s

Options

--host    Target URL (e.g., https://example.com)
--time    Duration of attack (e.g., 10s, 30s, 1m)

Example:

go run socket.go --host https://target.com --time 1m

How It Works

  • Generates random query strings to avoid caching
  • Rotates user agents using uarand
  • Sends concurrent HTTP GET requests
  • Tracks total requests sent using atomic counter
  • Stops after specified duration or manual interrupt

Disclaimer

This tool is provided for:

  • Security research
  • Educational purposes
  • Authorized stress testing

The author is not responsible for misuse, illegal activity, or any damage caused by this software.

Always obtain proper authorization before testing any system.


About

Simple http-flood ddo(s) write on golang

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages