Skip to content

Offensive Linux tool for network attacks. Built from the ground with only C.

License

Notifications You must be signed in to change notification settings

h3xduck/TCPcannon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GitHub release (latest by date) Maintainability GitHub code size in bytes GitHub last commit

TCPcannon

TCPcannon is a Linux tool for launching network attacks. It is built on top of RawTCP, my library to manage network packets and raw sockets.

The purpose of this development is to reproduce real network attacks using only the C language and with minimal dependencies.

Currently it only incorporates a SYN flooding module with and without spoofing, but more attacking modules and modes will come in later updates.

The name is a reference to the LOIC.

Installation

You can download the binary file for TCPcannon here.

Usage

Run ./TCPcannon -h to get tool usage:

Examples

Note: As stated in the library RawTCP, raw sockets require root proviliges to be used, so you will need them before running any of these examples.

SYN flood attack against 192.168.1.1 at port 8080

./TCPcannon -S -m direct -d 192.168.1.1:8000

SYN flooding against 192.168.1.1 at port 8080 randomly with spoofing

Source IP changes randomly between each sent packet.

./TCPcannon -S -m spoof -d 192.168.1.1:8000

Benchmark for packets/minute sent with SYN flooding spoofing mode

You will get the number of packets sent and packets/minute.

./TCPcannon -S -m benchmark -d 192.168.1.1:8000

Issues?

Whether it is a bug, question or suggestion, please open a ticket and I will have a look at it as fast as I possibly can.

LICENSE

This software is licensed under the MIT license. See LICENSE

About

Offensive Linux tool for network attacks. Built from the ground with only C.

Resources

License

Stars

Watchers

Forks

Packages

No packages published