🌊 RPING
============
🚀 rping: A robust, fully anonymous, Rust-based CLI for any TCP flag flooding attacks.
📖 Table of Contents
🚀 Installation
To install rping
, use the following Cargo command:
Once installed, run the following command:
This will set the CAP_NET_RAW
capability and make rping
run with elevated privileges.
✨ Features
- Perform any TCP flag, e.g. syn, flooding attacks with customizable parameters.
- Specify the length of tcp packets, target IP, target port, number of packets and the attack duration.
- Multi-threaded execution for increased efficiency.
- Both IP and TCP packets are carefully crafted to simulate a fully anonymous any flag TCP DoS Flood.
🚗 Usage
Learn how to use rping
and explore its features with the following examples:
Perform a SYN flooding attack:
Specify the packet length:
Use multiple threads:
Specify the TCP flag (e.g., ack, urg):
Set the attack duration in minutes:
Set the number of packets per thread:
Set the network interface:
🎨 Options
Option | Default Value | Description |
---|---|---|
-s, --size |
1500 |
Set the length of SYN packets. |
-t, --target |
Specify the target IP address to flood. | |
-p, --port |
80 |
Set the target port number for the attack. |
-h, --threads |
8 |
Set the number of threads for the attack. |
-f, --flag |
syn |
Specify the TCP flag (e.g., syn, ack, urg...). |
-d, --duration |
1 |
Set the attack duration in minutes. |
-n, --number |
2^63 |
Set the number of packets per thread. |
-i, --iface |
eth0 |
Set the network interface to bind the socket to. |
[!NOTE] Configuring the network interface is restricted to iOS, macOS, tvOS, or watchOS due to limitations in
socket2
.
🤝 Contributing
Contributions and feedback are welcome! If you'd like to contribute, report an issue, or suggest an enhancement, please engage with the project on GitHub. Your contributions help improve this CLI tool for the community.
📄 License
This project is licensed under the MIT License.