Skip to content

Elite01/MichFlooder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 

Repository files navigation

MichFlooder

License: MIT Python Platform

Description: Multi-threaded packet flooder using Scapy, supporting ICMP, TCP, UDP, DNS, HTTP, and HTTPS.


⚠️ Disclaimer

This tool is intended for educational and testing purposes only.
Do not use on any network without explicit permission.


🚀 Features

  • Supports ICMP, TCP SYN, UDP, DNS, HTTP, and HTTPS protocols.
  • Custom domain querying for DNS/HTTP.
  • Randomized IPs, ports, and payloads.
  • Adjustable packet size, interval, thread count, and total packet count.
  • Multi-threaded for maximum throughput.
  • Statistics reporting: packet count, total data sent, time elapsed, and throughput.

🛠️ Requirements

Install with:

pip install scapy

📦 Usage

python michflooder.py [options] TARGET

🔹 Positional Argument

Name Description
target Target IP, CIDR, or complete URI (e.g., 192.168.1.1, 10.0.0.0/24, http://example.com:8080)

🔸 Optional Arguments

Flag(s) Description Default
-p, --port Target port(s). Accepts port num (80), ranges (20-25), lists (80,10-20). dns: 53, http: 80, https: 443.
-n, --count Number of packets to send Infinite.
-s, --size Minimum packet size in bytes (max: 1450) Minimal.
-t, --threads Number of threads to use. Number of CPU cores.
-i, --interval Interval (in seconds) between packets. None.
-d, --domain Domain to include in DNS/HTTP(S) requests (required for --dns)
-r, --rand-domain Randomize subdomain (requires --dns )
-y, --accept Immediately start, dont ask for confirmation.

🔻 Protocol Selection (Mutually Exclusive)

Flag(s) Protocol Notes
-P, --ICMP, --PING ICMP (Ping) Must not specify --port
-T, --TCP TCP SYN Requires --port
-U, --UDP UDP Requires --port
-D, --DNS DNS over UDP Requires --domain
-H, --HTTP HTTP GET --domain Optional.
-S, --HTTPS HTTPS GET --domain Optional.

🔍 Examples

ICMP Ping Flood (Default Protocol)

python michflooder.py -n 1000 -t 4 192.168.1.1

TCP SYN Flood on Port 80

python michflooder.py -T -p 80 -n 1000 -t 8 192.168.1.50

UDP Flood on Range of Ports

python michflooder.py -U -p 1000-1010 -t 2 10.10.10.10

DNS Query Flood to Public Resolver

python michflooder.py -D -d example.com -n 1000 8.8.8.8

HTTP Flood on Custom Port

python michflooder.py -H -d example.org -p 8080 -n 500 192.168.0.99

HTTPS Flood

python michflooder.py https://google.com:443 -n 200 

📊 Output Sample

======================
==                  ==
== MichFlooder v1.0 ==
==  By MichelCohen  ==
==                  ==
======================

target    = 192.168.1.1
protocol  = icmp
threads   = 4
count     = 1000

Press Enter to start sending...

[12:00:01] Sending packets...

===== Attack Statistics =====
Start Time   : 12:00:01
End Time     : 12:00:05
Time Taken   : 0:00:04
Packets Sent : 4,000
Total Volume : 2.25 MB
Avg          : 0.56 MB/s
               1,000.00 PPS

📄 License

This project is licensed under the MIT License.


🙋‍♂️ Acknowledgments

Built using Scapy.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages