DDoS Tool that supports:
- DNS Amplification with ANY, TXT and NS Queries
- NTP Amplification (Network Time Protocol)
- SNMP Amplification (Simple Network Management Protocol)
- SSDP Amplification (Simple Service Discovery Protocol)
Read more about DDoS Amplification Attacks here
Donation would be much appreciated: 1Gi5Rpz5RBEUpGknSwyRgqzk7b5bQ7Abp2 ~ the original developer
- OS Supports raw sockets (For scanners and saddam++)
- Python 2.7
- Pinject
- gcc or equivalent
_____ __ __ ____ __ ____ __
/ ___/____ _____/ /___/ /___ _____ ___ / __ \/ /_ _______ / __ \/ /_ _______
\__ \/ __ `/ __ / __ / __ `/ __ `__ \ / /_/ / / / / / ___/ / /_/ / / / / / ___/
___/ / /_/ / /_/ / /_/ / /_/ / / / / / / / ____/ / /_/ (__ ) / ____/ / /_/ (__ )
/____/\__,_/\__,_/\__,_/\__,_/_/ /_/ /_/ /_/ /_/\__,_/____/ /_/ /_/\__,_/____/
https://github.com/OffensivePython/Saddam ~ https://github.com/merkjinx/saddam-plus-plus
https://twitter.com/OffensivePython
Usage:
Saddam.py target.com [options] # DDoS
Saddam.py benchmark [options] # Calculate AMPLIFICATION factor
Options:
-h, --help show this help message and exit
-d FILE:FILE|DOMAIN, --dns=FILE:FILE|DOMAIN
DNS Amplification File and Domains to Resolve (e.g:
dns.txt:[evildomain.com|domains_file.txt]
-n FILE, --ntp=FILE NTP Amplification file
-s FILE, --snmp=FILE SNMP Amplification file
-p FILE, --ssdp=FILE SSDP Amplification file
-t N, --threads=N Number of threads (default=1)
-P port, --port=port Attack port of target