Expand description
🌊 RPING
A powerful command-line tool for executing TCP SYN flooding attacks. Flood a target with a high volume of SYN packets to overwhelm and disrupt its network.
Quick Start
Get started with the rping
CLI by following these simple steps:
- Install the
rping
tool using Cargo:
cargo install --locked --all-features rping
- Use the following options to perform SYN flooding attacks and customize the attack parameters:
rping -s 100 -t 127.0.0.1 -p 80 -h 8
Options
Option | Description |
---|---|
--size | Sets the length of SYN packets. |
--target | Specifies the target IP address to flood. |
--port | Sets the target port number for the attack. |
--threads | Sets the number of threads for the attack. |
--flag | Specifies the TCP flag (e.g., syn, ack, urg…). |
--duration | Sets the attack duration in minutes. |
--number | Sets the number of packets per thread. |
--iface | Sets the network interface to bind the socket to. |
GitHub Repository
You can access the source code for this CLI tool on GitHub.
Contributing
Contributions and feedback are welcome! If you’d like to contribute, report an issue, or suggest an enhancement, please engage with the project on GitHub. Your contributions help improve this CLI tool for the community.
Let the SYN flood begin! 🌊