Crate rping

source ·
Expand description

🌊 RPING

A powerful command-line tool for executing TCP SYN flooding attacks. Flood a target with a high volume of SYN packets to overwhelm and disrupt its network.

Quick Start

Get started with the rping CLI by following these simple steps:

  1. Install the rping tool using Cargo:
cargo install --locked --all-features rping
  1. Use the following options to perform SYN flooding attacks and customize the attack parameters:
rping -s 100 -t 127.0.0.1 -p 80 -h 8

Options

OptionDescription
--sizeSets the length of SYN packets.
--targetSpecifies the target IP address to flood.
--portSets the target port number for the attack.
--threadsSets the number of threads for the attack.
--flagSpecifies the TCP flag (e.g., syn, ack, urg…).
--durationSets the attack duration in minutes.
--numberSets the number of packets per thread.
--ifaceSets the network interface to bind the socket to.

GitHub Repository

You can access the source code for this CLI tool on GitHub.

Contributing

Contributions and feedback are welcome! If you’d like to contribute, report an issue, or suggest an enhancement, please engage with the project on GitHub. Your contributions help improve this CLI tool for the community.

Let the SYN flood begin! 🌊

Modules