Skip to content

Create kxyzAttacks.py#1

Open
kxyznew wants to merge 1 commit intomainfrom
kxyznew-patch-1
Open

Create kxyzAttacks.py#1
kxyznew wants to merge 1 commit intomainfrom
kxyznew-patch-1

Conversation

@kxyznew
Copy link
Copy Markdown
Owner

@kxyznew kxyznew commented Dec 1, 2025

attack_info = {
'udp': ("UDP Flood", "Floods the target with UDP packets, overwhelming the network.", "Use when you want to disrupt network services."),
'tcp': ("TCP SYN Flood", "Sends a large number of TCP SYN packets to the target, exhausting its resources.", "Use to overwhelm the target's TCP stack."),
'icmp': ("ICMP Flood", "Floods the target with ICMP packets, consuming bandwidth and resources.", "Use to disrupt network communication."),
'http': ("HTTP Flood", "Sends a large number of HTTP requests to the target, exhausting its resources.", "Use to overwhelm web servers."),
'dns': ("DNS Amplification", "Uses DNS servers to amplify the attack, sending a large number of DNS responses to the target.", "Use to amplify the attack and overwhelm the target."),
'slowloris': ("Slowloris", "Keeps connections open to the target, exhausting its resources.", "Use to exhaust the target's resources over time."),
'portscan': ("Port Scan", "Scans the target for open ports, identifying potential entry points.", "Use to identify open ports and services."),
'serviceenum': ("Service Enumeration", "Identifies services running on open ports, providing information about the target.", "Use to gather information about the target's services."),
'bannergrab': ("Banner Grab", "Retrieves banners from services, identifying software versions and configurations.", "Use to gather information about the target's software."),
'packetsniff': ("Packet Sniffing", "Captures network traffic, analyzing packets for sensitive information.", "Use to capture and analyze network traffic."),
'arpspoof': ("ARP Spoofing", "Intercepts and modifies network traffic, redirecting it to the attacker.", "Use to intercept and modify network traffic."),
'dnsspoof': ("DNS Spoofing", "Redirects traffic to a malicious server, intercepting and modifying DNS responses.", "Use to redirect traffic and intercept DNS responses."),
'synflood': ("SYN Flood", "Sends a large number of TCP SYN packets to the target, exhausting its resources.", "Use to overwhelm the target's TCP stack."),
'tcpreset': ("TCP Reset", "Disrupts established TCP connections, forcing them to reset.", "Use to disrupt established TCP connections."),
'udpreflect': ("UDP Reflection", "Uses UDP servers to amplify the attack, sending a large number of UDP packets to the target.", "Use to amplify the attack and overwhelm the target."),
'icmpredirect': ("ICMP Redirect", "Redirects traffic to a malicious IP, intercepting and modifying ICMP packets.", "Use to redirect traffic and intercept ICMP packets."),
'httpflood': ("HTTP POST Flood", "Sends a large number of HTTP POST requests to the target, exhausting its resources.", "Use to overwhelm web servers with POST requests."),
'sslflood': ("SSL/TLS Handshake Flood", "Exhausts server resources with SSL/TLS handshakes, overwhelming the target.", "Use to exhaust the target's SSL/TLS resources."),
'dnsquery': ("DNS Query Flood", "Floods the target with DNS queries, consuming bandwidth and resources.", "Use to disrupt DNS services."),
'ntp': ("NTP Amplification", "Uses NTP servers to amplify the attack, sending a large number of NTP responses to the target.", "Use to amplify the attack and overwhelm the target."),
'ssdp': ("SSDP Amplification", "Uses SSDP servers to amplify the attack, sending a large number of SSDP responses to the target.", "Use to amplify the attack and overwhelm the target."),
'memcached': ("Memcached Amplification", "Uses Memcached servers to amplify the attack, sending a large number of Memcached responses to the target.", "Use to amplify the attack and overwhelm the target."),
'quic': ("QUIC Flood", "Overwhelms the target with QUIC packets, consuming bandwidth and resources.", "Use to disrupt QUIC services."),
'dnscache': ("DNS Cache Poisoning", "Injects malicious DNS records, redirecting traffic to a malicious server.", "Use to redirect traffic and intercept DNS responses."),
'bgphijack': ("BGP Hijacking", "Redirects network traffic through BGP hijacking, intercepting and modifying traffic.", "Use to redirect network traffic and intercept traffic."),
'dnsrebind': ("DNS Rebinding", "Exploits DNS rebinding vulnerabilities, redirecting traffic to a malicious server.", "Use to exploit DNS rebinding vulnerabilities."),
'http2': ("HTTP/2 Flood", "Overwhelms the target with HTTP/2 requests, exhausting its resources.", "Use to overwhelm HTTP/2 servers."),
'websocket': ("WebSocket Flood", "Overwhelms the target with WebSocket connections, exhausting its resources.", "Use to overwhelm WebSocket servers."),
'http3': ("HTTP/3 Flood", "Overwhelms the target with HTTP/3 requests, exhausting its resources.", "Use to overwhelm HTTP/3 servers."),
'doh': ("DNS over HTTPS (DoH) Flood", "Overwhelms the target with DoH requests, consuming bandwidth and resources.", "Use to disrupt DoH services.")
}

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant