This repository contains a script for performing network stress testing using both Ethernet-based desktop connections and specific IP addresses. The script generates a high volume of traffic to specified URLs, simulating Distributed Denial of Service (DDoS) attacks for testing purposes.
- Multi-threaded network stress testing
- Supports both Ethernet-based desktop and IP-specific methods
- Randomized user-agent strings for requests
- Asynchronous HTTP requests using
aiohttp
- Command-line interface for easy configuration
- Python 3.6+
aiohttp
libraryrequests
librarybeautifulsoup4
librarygooglesearch-python
library
- Clone the repository using HTTPS:
Alternatively, you can clone using SSH:
git clone https://github.com/Eipi-1-pi/DDOS_for_ethernet-.git cd DDOS_for_ethernet-
git clone [email protected]:Eipi-1-pi/DDOS_for_ethernet-.git cd DDOS_for_ethernet-
- Install the required dependencies:
pip install -r requirements.txt
- Run the script:
python Ethernet_stress(wifi).py
- Follow the on-screen instructions to choose the method (Ethernet-based or IP-specific) and enter the required details.
- To use Ethernet-based desktop:
Select option
python Ethernet_stress(wifi).py
[1]
from the menu. - To use a specific IP address:
Select option
python Ethernet_stress(wifi).py
[2]
from the menu and enter the IP address when prompted.
The manage.py
script provides additional management functionalities including system detection, script updating, and running the Ethernet stress test.
-
Display the UI and choose an option:
python manage.py
-
Options include:
- Detect System
- Update Script
- Install Requirements
- Run Ethernet Stress Test
This script is intended for educational and testing purposes only. The author and contributors are not responsible for any misuse or damage caused by this script. Use it responsibly and only on networks and systems you own or have permission to test.
Contributions are welcome! Please fork this repository and submit pull requests.
This project is licensed under the MIT License. See the LICENSE file for details.