Skip to content

Mauri web is a Python script designed to simulate a "flood" attack, specifically a TCP flood, on a specified server. The script utilizes multiple threads to establish concurrent connections and inundate the target server with traffic. The goal of this tool is to test the server's resilience to such flood attacks and analyze

License

Notifications You must be signed in to change notification settings

mauritaniacoder99/mauritania-web

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

M-Injector0x00 - Mauritania Coder

M-Injector0x00 Logo

Description

M-Injector0x00 is a Python script designed to perform "flood" attacks on specific servers using multiple threads.

Installation

  1. Make sure you have Python 3 installed on your computer.
  2. Install the required libraries using the following command:

pip install colorama tqdm

Usage

  1. Run the script using Python 3:

python3 mauritaniacracked.py

  1. Enter the attack information, such as the port number, IP address, and the number of threads.
  2. The attack will start automatically.

Notes

  • Use this tool with caution. Attacking systems or networks without permission may be illegal.
  • Ensure you have authorization to conduct security testing on the target systems.

Author

  • Mauritania Coder
  • GitHub: github.com/mauritaniacoder

License

This project is licensed under the MIT License - see the LICENSE file for details.

About

Mauri web is a Python script designed to simulate a "flood" attack, specifically a TCP flood, on a specified server. The script utilizes multiple threads to establish concurrent connections and inundate the target server with traffic. The goal of this tool is to test the server's resilience to such flood attacks and analyze

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages