"Break the balance, and find the weak point."
JustDos is an advanced Denial-of-Service (DoS) testing tool designed for ethical hacking and penetration testing. This powerful framework enables security professionals to evaluate system resilience against various DoS attack vectors in controlled environments. The tool features multiple attack modes, adaptive strategies, and realistic traffic simulation to help identify vulnerabilities in network infrastructure and web applications.
Key Features:
- Layer 7 attacks: HTTP/S Flood, Slowloris
- Layer 4 attacks: SYN Flood
- Hybrid attacks: Killer (Slowloris + HTTP Flood)
- Adaptive attack planning to avoid blocked paths
- Realistic header randomization to bypass security systems
- Proxy support and management
- Detailed performance benchmarking
- Ethical confirmation prompts before execution
Warning: This tool is strictly for authorized penetration testing and educational purposes. Unauthorized use against systems without explicit permission is illegal and unethical.
- Python 3.8+
- Linux/macOS (Windows support limited)
- Root privileges required for SYN Flood attacks
# Clone the repository
git clone https://github.com/rafacuy/JustDos.git
cd JustDos
# Install dependencies
pip install -r requirements.txthttpxtermcolorpyfigletscapy(for SYN Flood)
python3 main.py [attack_mode] [target] [port] [options]-
SYN Flood (Layer 4):
sudo python3 main.py syn 192.168.1.10 80 \ -p $(nproc) \ -d 60 \ -r 500-p: Number of parallel processes-d: Attack duration (seconds)-r: Packet rate limit per process
-
HTTP/S Flood (Layer 7):
python3 main.py http example.com 443 \ -w 100 \ -d 120 \ --https \ --adaptive \ --use-proxies \ --proxy-file proxies.txt
-w: Concurrent async workers--https: Use HTTPS--adaptive: Enable adaptive path avoidance--use-proxies: Enable proxy rotation
-
Slowloris Attack:
python3 main.py slowloris example.com 80 \ -c 1000 \ -i 5 \ -d 300
-c: Simultaneous connections-i: Keep-alive header interval (seconds)
-
Hybrid Killer Attack:
python3 main.py killer example.com 80 \ -c 500 \ -i 10 \ -w 75 \ -d 180 \ --https
- Adaptive Strategy Planner: Dynamically avoids blocked paths using:
planner = StrategyPlanner() if await planner.is_path_dangerous(path): continue
- Realistic Traffic Simulation: Generates browser-specific headers:
header_factory = HeaderFactory(pool_size=2000) headers = header_factory.get_headers()
- Proxy Management: Rotates proxies automatically:
proxy_pool = AdaptiveProxyPool(proxies, logger) proxy = await proxy_pool.get_proxy()
| Module | Purpose |
|---|---|
core.py |
Main attack logic and orchestration |
planner.py |
Adaptive strategy planning |
randomizer.py |
HTTP header randomization |
benchmark.py |
Performance metrics and reporting |
logger.py |
Request logging to justdos_attack.log |
proxy_manager.py |
Proxy rotation and management |
crawler.py |
Target path discovery |
Contributions are welcome! Please follow these guidelines:
- Fork the repository and create your feature branch
- Ensure code quality with type hints and docstrings
- Include tests for new functionality
- Update relevant documentation
- Submit a pull request with detailed description
Ethical Guidelines:
- All contributions must adhere to ethical hacking principles
- Never implement features designed for illegal use
- Maintain focus on defensive security testing
Please read the LEGALLITY for more details.
This project is licensed under the GPL-3.0 License. See LICENSE for details.
