

Screenshot of UnKnown DoSer - a Layer 7 flooder, with request randomization capability For example, the UnKnown DoSer, a Layer 7 flooder, even supports randomization of URL, User-Agent, and the Content-Length values in order to bypass hard-coded attack signatures. R.U.D.Y and other slow POST tools are noticeably missing from this bundle.Īnother group of tools provide some evasions, such as support for sending requests with different user agent and referer headers. If an attacker wants to launch a powerful Low and Slow DDoS attack, surprisingly he or she will find only a single tool in this bundle, the well-known perl tool, which is not authored by Anonymous at all. Screenshot of Pringle DDoS - a simple ICMP flooder

Other tools are focused on a single attack type, such as "Anonymous Ping Attack" and "Pringle DDOS", which only have ICMP flood capability. For example, some tools offer more Layer 7 attack granularity, while providing the attacker control of the attacked URL path and parameters and also supporting POST floods. Most of the tools offer similar DDoS attack types-mostly HTTP, TCP, and UDP floods-but there is some interesting differentiation. Screenshot from the video of multiple attack tools in use at once. This makes them very appealing to lay persons with little understanding of computer networking. It’s not necessary to have any understanding of how the attacks actually work in order to operate the tools. All of them are easy to use and have nice GUI menus.

2016 Tools BundleĪ substantial number of DDoS tools (20, in fact) are included in this bundle. Screenshot from the Anonymous DDOS Tools 2016 video on YouTube.
#Anon ddos tool zip file#
The video contains detailed examples of uses for various DDoS tools, and the video description contains a link to a zip file containing these tools. In February 2016, the hacktivist group Anonymous published a hacktivist message in a video posted on YouTube.
