Skip to content

Floodles — The sauciest way to flood! A modular collection of DoS & DDoS tools in Go, Rust, Bash, Python & Perl.

License

Notifications You must be signed in to change notification settings

franckferman/Floodles

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Contributors Forks Stargazers Issues License

Floodles Logo

Floodles

Modular The sauciest way to flood!
A modular and multi-language (Go, Rust, Bash, Python, Perl) toolkit for DoS & DDoS experiments.

📜 Table of Contents

Click to collapse/expand
  1. 📖 About
  2. ⚖️ Legal Disclaimer
  3. 📜 License
  4. 📞 Contact

📖 About

Floodles is a personal, experimental project, originally built for fun and private security testing. It is now shared publicly as a toolbox for security researchers and curious minds who want to explore Denial of Service (DoS & DDoS) attack techniques in a controlled, educational context.

⚠️ Note: This project is still under active development and restructuring.

Floodles is still under development. This project is being actively built and tested — stay tuned for future releases. If you’re interested in contributing, ideas, or early testing, feel free to open a discussion or contact me.

⚙️ Planned Features of Floodles

  • ✅ Wide range of DoS & DDoS techniques, including protocol-specific, volumetric, and resource-exhaustion attacks.
  • ✅ Multi-language implementation: tools developed in Go, Rust, Python, Bash, and Perl depending on the attack's nature.
  • ✅ CLI-based tools, lightweight and scriptable for automation and stress testing/lab usage.
  • 🚧 Web-based GUI (Graphical User Interface) planned for simplified control and visualization — useful for demo environments, labs, or stress testing coordinated exercises.

🚀 Planned Attack Types (Modules)

Floodles aims to support a wide range of known DoS/DDoS techniques, including but not limited to:

Attack Type Description / Reference
LOIC Low Orbit Ion Cannon (simple TCP/UDP/HTTP flooder).
LORIS Slowloris (slow HTTP headers to exhaust server sockets).
UFOSYN SYN Flood (classic half-open TCP attack).
FRAGGLE Fraggle Attack (UDP broadcast amplification).
UFORST RST/FIN Flood (reset connections forcefully).
SPRAY DRDOS (Distributed Reflective Denial of Service).
SMURF Smurf Attack (ICMP amplification via broadcast address).
XMAS Christmas Tree Packet (TCP packets with all flags set).
DROPER IP Fragmentation Attack (fragmented packets to crash devices).
SNIPER SNMP Reflection (amplification via SNMP).
TACHYON TCP SYN-ACK flood (multi-vector) (targeting TCP handshake).
PINGER ICMP Flood (ping flood to exhaust resources).
MONLIST NTP Amplification (reflection using NTP monlist command).
UFOACK ACK Flood (flooding ACK packets to overwhelm).
OVERLAP Fragment Overlap Attack (overlapping fragments to crash systems).
UFOUDP UDP Flood (simple high-rate UDP packet flood).
NUKE TCP Starvation Attack (denying TCP resources).

⚖️ Legal Disclaimer

Floodles is a security research and educational tool, created for studying and understanding various Denial of Service (DoS) and Distributed Denial of Service (DDoS) techniques, and for testing the resilience of systems under controlled environments.

⚠️ Warning: This tool is provided strictly for ethical, academic, and research purposes only. Do not use Floodles to attack, disrupt, harass, or harm individuals, organizations, networks, or systems without explicit, documented authorization. Misuse of this tool may violate national and international laws and could result in severe penalties. You are solely responsible for any actions you take using this tool. The author declines all liability for any misuse or damages caused.

If you are unsure about the legality of your intended use of this tool, consult a legal professional or competent authority before proceeding.

🔹 By using Floodles, you acknowledge that you have read, understood, and agreed to this disclaimer.

(🔼 Back to top)

📚 License

This project is licensed under the GNU Affero General Public License, Version 3.0. For more details, please refer to the LICENSE file in the repository: Read the license on GitHub

(🔼 Back to top)

📞 Contact

ProtonMail LinkedIn Twitter

(🔼 Back to top)