
Modular The sauciest way to flood!
A modular and multi-language (Go, Rust, Bash, Python, Perl) toolkit for DoS & DDoS experiments.
Click to collapse/expand
Floodles is a personal, experimental project, originally built for fun and private security testing. It is now shared publicly as a toolbox for security researchers and curious minds who want to explore Denial of Service (DoS & DDoS) attack techniques in a controlled, educational context.
Floodles is still under development. This project is being actively built and tested — stay tuned for future releases. If you’re interested in contributing, ideas, or early testing, feel free to open a discussion or contact me.
- ✅ Wide range of DoS & DDoS techniques, including protocol-specific, volumetric, and resource-exhaustion attacks.
- ✅ Multi-language implementation: tools developed in Go, Rust, Python, Bash, and Perl depending on the attack's nature.
- ✅ CLI-based tools, lightweight and scriptable for automation and stress testing/lab usage.
- 🚧 Web-based GUI (Graphical User Interface) planned for simplified control and visualization — useful for demo environments, labs, or stress testing coordinated exercises.
Floodles aims to support a wide range of known DoS/DDoS techniques, including but not limited to:
Attack Type | Description / Reference |
---|---|
LOIC | Low Orbit Ion Cannon (simple TCP/UDP/HTTP flooder). |
LORIS | Slowloris (slow HTTP headers to exhaust server sockets). |
UFOSYN | SYN Flood (classic half-open TCP attack). |
FRAGGLE | Fraggle Attack (UDP broadcast amplification). |
UFORST | RST/FIN Flood (reset connections forcefully). |
SPRAY | DRDOS (Distributed Reflective Denial of Service). |
SMURF | Smurf Attack (ICMP amplification via broadcast address). |
XMAS | Christmas Tree Packet (TCP packets with all flags set). |
DROPER | IP Fragmentation Attack (fragmented packets to crash devices). |
SNIPER | SNMP Reflection (amplification via SNMP). |
TACHYON | TCP SYN-ACK flood (multi-vector) (targeting TCP handshake). |
PINGER | ICMP Flood (ping flood to exhaust resources). |
MONLIST | NTP Amplification (reflection using NTP monlist command). |
UFOACK | ACK Flood (flooding ACK packets to overwhelm). |
OVERLAP | Fragment Overlap Attack (overlapping fragments to crash systems). |
UFOUDP | UDP Flood (simple high-rate UDP packet flood). |
NUKE | TCP Starvation Attack (denying TCP resources). |
Floodles
is a security research and educational tool, created for studying and understanding various Denial of Service (DoS) and Distributed Denial of Service (DDoS) techniques, and for testing the resilience of systems under controlled environments.
⚠️ Warning: This tool is provided strictly for ethical, academic, and research purposes only. Do not use Floodles to attack, disrupt, harass, or harm individuals, organizations, networks, or systems without explicit, documented authorization. Misuse of this tool may violate national and international laws and could result in severe penalties. You are solely responsible for any actions you take using this tool. The author declines all liability for any misuse or damages caused.
If you are unsure about the legality of your intended use of this tool, consult a legal professional or competent authority before proceeding.
🔹 By using Floodles, you acknowledge that you have read, understood, and agreed to this disclaimer.
This project is licensed under the GNU Affero General Public License, Version 3.0. For more details, please refer to the LICENSE file in the repository: Read the license on GitHub