rping 0.1.2

🌊 A Fully Anonymous Any TCP Flag Flooding Attack CLI.
Documentation

🌊 RPING

Crates.io docs License

rping 0.1.2
 ▄▄▄▄▄▄▄▄▄▄▄  ▄▄▄▄▄▄▄▄▄▄▄  ▄▄▄▄▄▄▄▄▄▄▄  ▄▄        ▄  ▄▄▄▄▄▄▄▄▄▄▄ 
▐░░░░░░░░░░░▌▐░░░░░░░░░░░▌▐░░░░░░░░░░░▌▐░░▌      ▐░▌▐░░░░░░░░░░░▌
▐░█▀▀▀▀▀▀▀█░▌▐░█▀▀▀▀▀▀▀█░▌ ▀▀▀▀█░█▀▀▀▀ ▐░▌░▌     ▐░▌▐░█▀▀▀▀▀▀▀▀▀ 
▐░▌       ▐░▌▐░▌       ▐░▌     ▐░▌     ▐░▌▐░▌    ▐░▌▐░▌          
▐░█▄▄▄▄▄▄▄█░▌▐░█▄▄▄▄▄▄▄█░▌     ▐░▌     ▐░▌ ▐░▌   ▐░▌▐░▌ ▄▄▄▄▄▄▄▄ 
▐░░░░░░░░░░░▌▐░░░░░░░░░░░▌     ▐░▌     ▐░▌  ▐░▌  ▐░▌▐░▌▐░░░░░░░░▌
▐░█▀▀▀▀█░█▀▀ ▐░█▀▀▀▀▀▀▀▀▀      ▐░▌     ▐░▌   ▐░▌ ▐░▌▐░▌ ▀▀▀▀▀▀█░▌
▐░▌     ▐░▌  ▐░▌               ▐░▌     ▐░▌    ▐░▌▐░▌▐░▌       ▐░▌
▐░▌      ▐░▌ ▐░▌           ▄▄▄▄█░█▄▄▄▄ ▐░▌     ▐░▐░▌▐░█▄▄▄▄▄▄▄█░▌
▐░▌       ▐░▌▐░▌          ▐░░░░░░░░░░░▌▐░▌      ▐░░▌▐░░░░░░░░░░░▌
          ▀  ▀            ▀▀▀▀▀▀▀▀▀▀▀  ▀        ▀▀  ▀▀▀▀▀▀▀▀▀▀▀ 

🌊 RPING CLI
============

A powerful command-line tool for executing TCP SYN flooding attacks.
Flood a target with a high volume of SYN packets to overwhelm and
disrupt its network.

🚀 rping: A robust, fully anonymous, Rust-based CLI for any TCP flag flooding attacks.

📖 Table of Contents

🚀 Installation

To install rping, use the following Cargo command:

cargo install --locked --all-features rping

Once installed, run the following command:

sudo setcap cap_net_raw+ep ~/.cargo/bin/rping

This will set the CAP_NET_RAW capability and make rping run with elevated privileges.

✨ Features

  • Perform SYN flooding attacks with customizable parameters.
  • Specify the length of SYN packets, target IP, and target port.
  • Multi-threaded execution for increased efficiency.

🚗 Usage

Learn how to use rping and explore its features with the following examples:

Perform a SYN flooding attack:

rping -t 127.0.0.1 -p 80

Specify the packet length:

rping -s 150 -t 127.0.0.1 -p 443

Use multiple threads:

rping -s 1500 -t 127.0.0.1 -p 8080 -h 16

🎨 Options

Option Default Value Description
-s, --size 1500 Set the length of SYN packets.
-t, --target Specify the target IP address to flood.
-p, --port 80 Set the target port number for the attack.
-h, --threads 8 Set the number of threads for the attack.

🤝 Contributing

Contributions and feedback are welcome! If you'd like to contribute, report an issue, or suggest an enhancement, please engage with the project on GitHub. Your contributions help improve this CLI tool for the community.

📄 License

This project is licensed under the MIT License.