A powerful CLI-based network stress testing tool designed for authorized penetration testing and infrastructure resilience evaluation.
FOR AUTHORIZED TESTING ONLY
This tool is intended exclusively for:
- Testing your own infrastructure
- Authorized penetration testing with written permission
- Educational and research purposes in controlled environments
Unauthorized use against systems you don't own is illegal and may result in criminal prosecution. The developers assume no responsibility for misuse of this software.
- 🎯 Multiple Attack Vectors - 9 different stress testing methods
- 📊 Real-time Statistics - Live monitoring of attack progress
- 🔒 Thread-safe Execution - Efficient multi-threaded operations
- ⚡ Rate Limiting - Controlled traffic generation
- 📝 Comprehensive Logging - Detailed attack logs for analysis
- 🛑 Graceful Shutdown - Clean termination with Ctrl+C
- 🔀 Mixed Attacks - Randomized attack patterns
- Python 3.6 or higher
- Administrative/root privileges (for raw socket operations)
git clone https://github.com/xdrew87/DeathStress.git
cd DeathStress
pip install -r requirements.txtpython main.py | Method | Description | Use Case |
|---|---|---|
syn |
TCP SYN flood attack | Test SYN flood protection |
udp |
UDP packet flood | Test UDP handling capacity |
http-get |
HTTP GET request flood | Test web server capacity |
http-post |
HTTP POST request flood | Test form handling limits |
slowloris |
Slow HTTP header attack | Test connection timeout handling |
rudy |
R-U-Dead-Yet slow POST | Test POST request timeouts |
icmp |
ICMP ping flood | Test ICMP rate limiting |
dns |
DNS query flood | Test DNS server capacity |
mixed |
Randomized attack mix | Comprehensive stress testing |
python main.py --target 192.168.1.100 --method syn --duration 60 --threads 20python main.py --target example.com --port 80 --method http-get --duration 30 --threads 10python main.py --target 192.168.1.100 --method mixed --duration 120 --threads 15 --rate-limit 100python main.py --target 192.168.1.100 --method udp --log results.log --duration 60 --packet-size 2048| Argument | Description | Default | Required |
|---|---|---|---|
--target |
Target IP address or domain | - | ✅ |
--port |
Target port number | 80 | ❌ |
--method |
Attack method to use | - | ✅ |
--duration |
Attack duration (seconds) | 60 | ❌ |
--threads |
Number of concurrent threads | 10 | ❌ |
--packet-size |
Packet size for flood attacks (bytes) | 1024 | ❌ |
--rate-limit |
Requests per second per thread | unlimited | ❌ |
--log |
Log file path for results | - | ❌ |
- ✅ Ensure you own the target infrastructure
- ✅ Obtain written authorization for third-party systems
- ✅ Notify relevant stakeholders about testing
- ✅ Have incident response procedures ready
- 📊 Monitor system resources and performance
- ⏰ Respect agreed-upon testing windows
- 🚨 Stop immediately if unintended impact occurs
- 📋 Document findings and vulnerabilities
- 🔧 Implement necessary security improvements
- 🗑️ Securely dispose of sensitive logs
Contributions are welcome! Please feel free to submit pull requests, report bugs, or suggest features.
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
For questions, issues, or responsible disclosure of security vulnerabilities, please open an issue on GitHub.
Remember: With great power comes great responsibility. Use this tool ethically and legally.