GhostDOS is for authorized security testing ONLY. Use only on systems you own or have explicit written permission to test. Unauthorized use may violate laws and result in severe penalties.
- IP Spoofing: Multiple modes (random, geographic, cloud providers)
- Human Behavior Simulation: Realistic browsing patterns
- Protocol Mixing: Multiple attack vectors simultaneously
- Traffic Pattern Randomization: Mimics real user surges
- TLS/SSL Support: Encrypted attack traffic
- Browser Fingerprinting: Realistic HTTP headers and cookies
- HTTP/HTTPS Flood: Human-like web traffic
- TCP SYN Flood: Connection exhaustion
- SlowLoris: Slow HTTP connections
- DNS Amplification: Reflected amplification attacks
- Mixed Attacks: Multiple vectors simultaneously
- Geographic IP distribution
- Real browser user agents
- Search query simulation
- Session persistence
- Referrer chains
- Human think times
- Randomized delays
# Kali Linux (recommended) or any Linux with:
# - Python 3.8+
# - Root privileges (for raw sockets)
# - Basic networking tools
# Check Python version
python3 --version
# Check privileges (need root)
sudo whoami# 1. Download GhostDOS
git clone https://github.com/razielapps/ghostdos.git
cd ghostdos
# 2. Run setup script (as root)
sudo bash setup_ghostdos.sh
# 3. Make executable
chmod +x ghostdos.py# Show help
sudo python3 ghostdos.py --help
# Basic attack (60 seconds, medium intensity)
sudo python3 ghostdos.py --target example.com:80 --duration 60 --intensity medium
# HTTPS attack
sudo python3 ghostdos.py --target https://target.com --duration 120 --intensity high
# Custom configuration
sudo python3 ghostdos.py --target 192.168.1.100:443 --duration 300 --spoof geographic --intensity extreme--target, -t Target (IP:port, domain:port, or URL) [REQUIRED]
--duration, -d Attack duration in seconds (default: 60)
--intensity, -i Intensity level: low, medium, high, extreme (default: medium)
--spoof, -s Spoofing mode: random, geographic, sequential, cloud_providers
--protocol, -p Protocol: mixed, http, syn, dns, slowloris (default: mixed)
--threads Override thread count
--verbose, -v Verbose output
--dry-run Simulate without sending packets| Level | Threads | Packets/Sec | Description |
|---|---|---|---|
| Low | 10 | 100 | Stealth testing |
| Medium | 50 | 1,000 | Standard load |
| High | 200 | 5,000 | Stress testing |
| Extreme | 500 | 10,000 | Maximum load |
- Random: Completely random IP addresses
- Geographic: Regional distribution (mimics global users)
- Sequential: Sequential IPs from cloud ranges
- Cloud Providers: Only cloud provider IP addresses
1. Target Analysis
โโโ Parse target (IP/port/URL)
โโโ Determine protocol
โโโ Select attack vectors
2. IP Spoofing
โโโ Generate spoofed source IPs
โโโ Randomize source ports
โโโ Geographic distribution
3. Human Behavior Simulation
โโโ Realistic browser fingerprints
โโโ Session cookies
โโโ Referrer chains
โโโ Human think times
4. Protocol Attacks
โโโ HTTP/HTTPS floods
โโโ TCP SYN floods
โโโ SlowLoris connections
โโโ DNS amplification
5. Evasion
โโโ Traffic pattern randomization
โโโ TLS encryption
โโโ Header randomization
โโโ Rate limiting
- Burst Patterns: Mimic real user activity bursts
- Geographic Distribution: IPs from actual regions
- Browser Fingerprints: Real Chrome/Firefox/Safari headers
- Session Persistence: Maintain cookies and sessions
- Referrer Simulation: Realistic navigation paths
- Human Delays: Reading/thinking times between actions
ghost_logs/
โโโ ghostdos_20240115_143022.log
Log Format:
2024-01-15 14:30:22 | INFO | Thread-1 | Starting HTTP flood on example.com:80
2024-01-15 14:30:27 | INFO | MainThread | Progress: 5.0s | Active: 50/50 | Packets: 1250 (250.0/s)
ghost_reports/
โโโ attack_20240115_143022.json
Report Content:
{
"target": "example.com:80",
"timestamp": "2024-01-15T14:30:22",
"duration_seconds": 60,
"intensity": "medium",
"total_packets": 45000,
"total_bytes": 225000000,
"packets_per_second": 750.0,
"bytes_per_second": 3750000.0,
"attack_distribution": {
"HTTPFlood": 35,
"SYNFlood": 15
},
"spoofing_mode": "geographic"
}During execution, you'll see:
Progress: 15.0s | Active: 48/50 | Packets: 11250 (750.0/s) | Bytes: 56.2MB (3.7MB/s)
- Authorized Penetration Testing: With written permission
- Security Research: In controlled lab environments
- System Hardening: Testing your own infrastructure
- Educational Purposes: Classroom learning with permission
- Bug Bounty Programs: Within explicitly defined scope
- Unauthorized Testing: Any system without permission
- Service Disruption: Causing downtime for others
- Malicious Attacks: For harm or extortion
- Law Violation: Breaking computer fraud laws
- Terms of Service Violation: Cloud provider ToS
- Computer Fraud and Abuse Act (CFAA)
- General Data Protection Regulation (GDPR)
- Local Cybersecurity Laws
- Service Provider Terms
- Organizational Policies
Error: "Permission denied" for raw socketsSolution:
sudo python3 ghostdos.py [options]Error: Connection refused/timeoutCheck:
- Target is online and reachable
- No firewall blocking
- Correct port is open
- DNS resolution works
Low packet rateAdjust:
# Reduce thread count
--threads 20
# Lower intensity
--intensity low
# Increase system limits
ulimit -n 65535
sysctl -w net.core.somaxconn=65535# Verbose output
sudo python3 ghostdos.py --target example.com --verbose
# Dry run (simulation)
sudo python3 ghostdos.py --target example.com --dry-run
# Save output
sudo python3 ghostdos.py --target example.com 2>&1 | tee output.logThis tool demonstrates:
- Network Protocols: TCP/IP, HTTP, DNS, SSL/TLS
- Attack Vectors: Multiple DDoS techniques
- Evasion Techniques: IP spoofing, traffic mimicry
- Traffic Analysis: Pattern recognition
- Defense Strategies: Mitigation techniques
- Ethical Considerations: Responsible disclosure
By understanding attacks, you learn to:
- Implement rate limiting
- Configure Web Application Firewalls (WAF)
- Set up intrusion detection systems (IDS)
- Deploy DDoS protection services
- Monitor traffic patterns
- Respond to incidents
- Unusual Geographic Distribution: Traffic from unexpected regions
- Header Anomalies: Non-standard browser headers
- Session Patterns: Unusual cookie/session behavior
- Rate Abnormalities: Sudden traffic spikes
- Protocol Mixing: Multiple attack vectors simultaneously
- Rate Limiting: Per-IP request limits
- Geo-blocking: Block suspicious regions
- CAPTCHA: Challenge suspicious traffic
- WAF Rules: Pattern-based blocking
- CDN Protection: Cloud-based DDoS protection
- Traffic Scrubbing: Clean traffic centers
- LOIC: Low Orbit Ion Cannon
- HOIC: High Orbit Ion Cannon
- HULK: HTTP Unbearable Load King
- R.U.D.Y: R-U-Dead-Yet (SlowLoris)
- Snort: Intrusion Detection
- Suricata: Network Security Monitoring
- ModSecurity: Web Application Firewall
- Fail2Ban: Intrusion Prevention
- AI-Powered Traffic Generation: Machine learning for realism
- Blockchain Integration: Decentralized attack coordination
- Mobile Traffic Simulation: Smartphone user behavior
- API Attacks: REST/graphQL specific attacks
- Cloud Service Attacks: AWS/Azure/GCP specific vectors
- Adversarial machine learning
- Zero-day attack vectors
- Quantum-resistant cryptography
- 5G network vulnerabilities
- IoT device security
USE RESPONSIBLY AND LEGALLY.
GhostDOS is a powerful security tool that can cause serious harm if misused.
Always obtain proper authorization before testing any system.
The developers assume no liability for misuse of this software.
GhostDOS v2.0 - Advanced DDoS stress testing for security professionals. Remember: With great power comes great responsibility.
- Multiple IP spoofing modes
- Geographic distribution
- Cloud provider IPs
- Sequential/random patterns
- Real browser fingerprints
- Session persistence
- Referrer chains
- Human think times
- Search query simulation
- HTTP/HTTPS floods
- TCP SYN floods
- SlowLoris
- DNS amplification
- Mixed attacks
- Traffic pattern randomization
- TLS encryption
- Header randomization
- Rate limiting
- Geographic distribution
- Real-time statistics
- JSON reporting
- Logging system
- Performance monitoring
- Resource management
Author: Conscience Ekhomwandolor