🌊 RPING
============
🚀 rping: A robust, fully anonymous, Rust-based CLI for any TCP flag flooding attacks.
📖 Table of Contents
🚀 Installation
To install rping, use the following Cargo command:
Once installed, run the following command:
This will set the CAP_NET_RAW capability and make rping run with elevated privileges.
✨ Features
- Perform SYN flooding attacks with customizable parameters.
- Specify the length of SYN packets, target IP, and target port.
- Multi-threaded execution for increased efficiency.
🚗 Usage
Learn how to use rping and explore its features with the following examples:
Perform a SYN flooding attack:
Specify the packet length:
Use multiple threads:
🎨 Options
| Option | Default Value | Description |
|---|---|---|
-s, --size |
1500 |
Set the length of SYN packets. |
-t, --target |
Specify the target IP address to flood. | |
-p, --port |
80 |
Set the target port number for the attack. |
-h, --threads |
8 |
Set the number of threads for the attack. |
🤝 Contributing
Contributions and feedback are welcome! If you'd like to contribute, report an issue, or suggest an enhancement, please engage with the project on GitHub. Your contributions help improve this CLI tool for the community.
📄 License
This project is licensed under the MIT License.