Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
attack_info = {
'udp': ("UDP Flood", "Floods the target with UDP packets, overwhelming the network.", "Use when you want to disrupt network services."),
'tcp': ("TCP SYN Flood", "Sends a large number of TCP SYN packets to the target, exhausting its resources.", "Use to overwhelm the target's TCP stack."),
'icmp': ("ICMP Flood", "Floods the target with ICMP packets, consuming bandwidth and resources.", "Use to disrupt network communication."),
'http': ("HTTP Flood", "Sends a large number of HTTP requests to the target, exhausting its resources.", "Use to overwhelm web servers."),
'dns': ("DNS Amplification", "Uses DNS servers to amplify the attack, sending a large number of DNS responses to the target.", "Use to amplify the attack and overwhelm the target."),
'slowloris': ("Slowloris", "Keeps connections open to the target, exhausting its resources.", "Use to exhaust the target's resources over time."),
'portscan': ("Port Scan", "Scans the target for open ports, identifying potential entry points.", "Use to identify open ports and services."),
'serviceenum': ("Service Enumeration", "Identifies services running on open ports, providing information about the target.", "Use to gather information about the target's services."),
'bannergrab': ("Banner Grab", "Retrieves banners from services, identifying software versions and configurations.", "Use to gather information about the target's software."),
'packetsniff': ("Packet Sniffing", "Captures network traffic, analyzing packets for sensitive information.", "Use to capture and analyze network traffic."),
'arpspoof': ("ARP Spoofing", "Intercepts and modifies network traffic, redirecting it to the attacker.", "Use to intercept and modify network traffic."),
'dnsspoof': ("DNS Spoofing", "Redirects traffic to a malicious server, intercepting and modifying DNS responses.", "Use to redirect traffic and intercept DNS responses."),
'synflood': ("SYN Flood", "Sends a large number of TCP SYN packets to the target, exhausting its resources.", "Use to overwhelm the target's TCP stack."),
'tcpreset': ("TCP Reset", "Disrupts established TCP connections, forcing them to reset.", "Use to disrupt established TCP connections."),
'udpreflect': ("UDP Reflection", "Uses UDP servers to amplify the attack, sending a large number of UDP packets to the target.", "Use to amplify the attack and overwhelm the target."),
'icmpredirect': ("ICMP Redirect", "Redirects traffic to a malicious IP, intercepting and modifying ICMP packets.", "Use to redirect traffic and intercept ICMP packets."),
'httpflood': ("HTTP POST Flood", "Sends a large number of HTTP POST requests to the target, exhausting its resources.", "Use to overwhelm web servers with POST requests."),
'sslflood': ("SSL/TLS Handshake Flood", "Exhausts server resources with SSL/TLS handshakes, overwhelming the target.", "Use to exhaust the target's SSL/TLS resources."),
'dnsquery': ("DNS Query Flood", "Floods the target with DNS queries, consuming bandwidth and resources.", "Use to disrupt DNS services."),
'ntp': ("NTP Amplification", "Uses NTP servers to amplify the attack, sending a large number of NTP responses to the target.", "Use to amplify the attack and overwhelm the target."),
'ssdp': ("SSDP Amplification", "Uses SSDP servers to amplify the attack, sending a large number of SSDP responses to the target.", "Use to amplify the attack and overwhelm the target."),
'memcached': ("Memcached Amplification", "Uses Memcached servers to amplify the attack, sending a large number of Memcached responses to the target.", "Use to amplify the attack and overwhelm the target."),
'quic': ("QUIC Flood", "Overwhelms the target with QUIC packets, consuming bandwidth and resources.", "Use to disrupt QUIC services."),
'dnscache': ("DNS Cache Poisoning", "Injects malicious DNS records, redirecting traffic to a malicious server.", "Use to redirect traffic and intercept DNS responses."),
'bgphijack': ("BGP Hijacking", "Redirects network traffic through BGP hijacking, intercepting and modifying traffic.", "Use to redirect network traffic and intercept traffic."),
'dnsrebind': ("DNS Rebinding", "Exploits DNS rebinding vulnerabilities, redirecting traffic to a malicious server.", "Use to exploit DNS rebinding vulnerabilities."),
'http2': ("HTTP/2 Flood", "Overwhelms the target with HTTP/2 requests, exhausting its resources.", "Use to overwhelm HTTP/2 servers."),
'websocket': ("WebSocket Flood", "Overwhelms the target with WebSocket connections, exhausting its resources.", "Use to overwhelm WebSocket servers."),
'http3': ("HTTP/3 Flood", "Overwhelms the target with HTTP/3 requests, exhausting its resources.", "Use to overwhelm HTTP/3 servers."),
'doh': ("DNS over HTTPS (DoH) Flood", "Overwhelms the target with DoH requests, consuming bandwidth and resources.", "Use to disrupt DoH services.")
}