This tool is designed exclusively for:
- Security professionals conducting authorized penetration tests
- System administrators testing their own infrastructure
- Network engineers performing capacity planning
- Educational institutions in controlled lab environments
Unauthorized use against any system you do not own or have explicit written permission to test is:
- โ ILLEGAL under international cybercrime laws
- โ UNETHICAL and violates responsible disclosure practices
- โ PUNISHABLE by imprisonment, fines, and civil liability
The author assumes NO responsibility for any misuse. You are solely accountable for your actions.
DDoSSCAN is an open-source network availability and stress testing tool written in Python. It is designed for security researchers, network engineers, and system administrators who need to test the resilience and availability of their own infrastructure.
Key highlights:
- Built-in Domain Safety Blocker โ automatically blocks government, military, and critical infrastructure domains
- Multi-vector stress testing: TCP, HTTP, UDP, Slowloris, Mixed
- Smart parameter calculator based on your available bandwidth
- Real-time live statistics dashboard
- Session-based report generator (TXT + JSON)
- Clean VIP terminal interface with animated boot sequence
- Works on Linux, Windows, macOS, and Termux (Android)
| Feature | Description | Status |
|---|---|---|
| ๐ก๏ธ Smart Domain Blocking | Automatic protection against government/military/critical infrastructure | โ NEW |
| ๐ Real-Time Dashboard | Live statistics with packet counters, success rates, and performance metrics | โ NEW |
| ๐ง Bandwidth Calculator | AI-powered parameter optimization based on your network capacity | โ NEW |
| ๐ Session Reports | Automatic report generation (JSON/TXT) with execution logs | โ NEW |
| ๐จ VIP Interface | Animated terminal UI with professional color scheme | โ NEW |
| ๐ Multi-Vector Attacks | TCP, HTTP, UDP, Slowloris, and Mixed modes | โ ENHANCED |
| ๐ฑ Cross-Platform | Linux, Windows, macOS, and Termux (Android) support | โ |
DDoSSCAN includes an automatic domain blocker that prevents testing against protected infrastructure:
graph LR
A[Domain Safety System] --> B[Government TLDs]
A --> C[Military Keywords]
A --> D[Critical Infrastructure]
A --> E[Major CDNs]
A --> F[International Orgs]
B --> B1[.gov, .mil, .go.id, .gouv.fr...]
C --> C1[army, navy, tni, nato, pentagon...]
D --> D1[google, facebook, banks, media...]
E --> E1[cloudflare, akamai, fastly...]
F --> F1[un.org, who.int, redcross...]
Configurable Blocklist: config/blocked_domains.json
โ๏ธ Load testing servers you personally own
โ๏ธ Stress testing your VPS/cloud instances
โ๏ธ Internal network capacity testing
โ๏ธ Security research with written authorization
โ๏ธ CTF competitions & lab environments
โ๏ธ Educational demonstrations
โ๏ธ Attacking any server without explicit written consent
โ๏ธ Targeting government, military, or critical infrastructure
โ๏ธ DDoS attacks against production systems
โ๏ธ Any malicious or illegal activities
Python 3.8+ | pip | git๐ง Linux / macOS
git clone https://github.com/ruyynn/DDoSSCAN.git
cd DDoSSCAN
pip install colorama
python3 src/DDoSSCAN_v2.py๐ช Windows
git clone https://github.com/ruyynn/DDoSSCAN.git
cd DDoSSCAN
pip install colorama
python src/DDoSSCAN_v2.py๐ฑ Termux (Android)
pkg update && pkg upgrade
pkg install python git
git clone https://github.com/ruyynn/DDoSSCAN.git
cd DDoSSCAN
pip install colorama
python DDoSSCAN_v2.pypip install requests scapy paramiko # Enhanced functionality| Method | OSI Layer | Technique | Best For |
|---|---|---|---|
| HTTP Flood | Layer 7 | Exhausts HTTP connection pool | Web servers, applications |
| TCP Flood | Layer 4 | SYN/ACK connection flood | Firewalls, stateful devices |
| UDP Flood | Layer 4 | High-bandwidth packet flood | Network infrastructure |
| Slowloris | Layer 7 | Holds connections open | Apache, threaded servers |
| Mixed Mode | L4 + L7 | Rotating attack vectors | Comprehensive testing |
DDoSSCAN/
โโโ ๐ README.md # Documentation
โโโ ๐ LICENSE # license
โโโ โ ๏ธ DISCLAIMER.md # Legal disclaimer
โโโ ๐ CHANGELOG.md # Version history
โโโ ๐ src/
โ โโโ ๐ DDoSSCAN_v2.py # Main application
โโโ ๐ config/
โ โโโ ๐ก๏ธ blocked_domains.json # Safety blocklist
โโโ ๐ docs/
โโโ ๐ usage-guide.md # Detailed usage
โโโ โ faq.md # Frequently asked questions
โ Automatic domain blocking - No accidental targeting of protected sites
โ Bandwidth throttling - Prevents network saturation
โ Graceful termination - Ctrl+C safely stops all operations
โ Session logging - Complete audit trail of all activities
โ Error handling - Robust exception management
We welcome contributions! Please:
Fork the repository
Create a feature branch (git checkout -b feature/AmazingFeature)
Commit your changes (git commit -m 'Add AmazingFeature)
Push to branch (git push origin feature/AmazingFeature)
Open a Pull Request
If DDoSSCAN has helped you in your security research or network testing, consider supporting future development:
Every contribution helps maintain and improve the tool
This project is licensed under the GNU General Public License v3.0.
You are free to:
โ Use the software
โ Study and modify the source code
โ Share and redistribute the software
โ Create derivative works under the same GPL v3 license
Additional project terms apply, including attribution and project name protection. See ADDITIONAL_TERMS.md for details.
| Platform | Link | Action |
|---|---|---|
| ๐ป GitHub | @ruyynn | |
| ๐ Facebook | @ruyynn | |
| ๐ง Email | ruyynn25@gmail.com |
Use Responsibly. Test Ethically. Secure Proactively.
DDoSSCAN v2.0 โ Made with ๐ฅ by ruyynn