Skip to content

wavegxz-design/devilZERO

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔥 ─ Modular DDoS Testing Toolkit.md

Typing SVG

Version   Python   License   Platform   Stars



🔥 devilZERO ─ Modular DDoS Testing Toolkit

devilZERO is a cutting-edge, modular DDoS testing toolkit engineered for authorized security assessments and ethical penetration testing. It provides a robust suite of attack vectors to simulate Distributed Denial of Service scenarios across various layers, helping security professionals identify and mitigate vulnerabilities in their infrastructure.

Key Capabilities:

  • Layer 4 Attacks: Comprehensive support for TCP, UDP, SYN, ICMP, Minecraft, VSE, and TS3/FiveM floods.
  • Layer 7 Attacks: Advanced HTTP/HTTPS floods, including Cloudflare bypass (CFB/CFBUAM), session-based requests, dynamic host randomization, and WordPress XMLRPC amplification.
  • Amplification Vectors: Exploits DNS, NTP, RDP, CLDAP, MEM, CHAR, and ARD for powerful reflection attacks.
  • Utilities & Analytics: Real-time packet/byte counters, IP geolocation, proxy management, and color-coded terminal output for enhanced situational awareness.

⚠️ IMPORTANT: Ethical Use Only This tool is strictly intended for authorized security assessments and educational purposes. Unauthorized use against systems you do not own or have explicit permission to test is illegal and unethical. The author (krypthane) is not responsible for any misuse or damage caused by this software.


✨ Features at a Glance

Category Attack Vector Description Key Options
🎯 Layer 4 TCP Flood Connect flood with random payloads target, port, threads
UDP Flood High-rate UDP packet injection target, port, threads, size
SYN Flood Raw TCP SYN packet storm (requires root) target, port, threads
ICMP Flood Ping flood (requires root) target, threads
Minecraft Server ping spam with handshake target, port
MCBOT Automated bot login and chat flood target, port, bots
VSE / TS3 / FiveM Game server query attacks target, port
🌐 Layer 7 GET / POST Configurable HTTP/HTTPS request floods target, threads, method
CFB / CFBUAM Cloudflare-resistant methods target, threads
BYPASS Session-based requests target, threads
STRESS High-payload JSON POST target, threads, data
SLOW Slow-rate connection keep-alive (Slowloris) target, threads
DYN Dynamic host header randomization target, threads
TOR .onion via tor2web gateways target, threads
XMLRPC WordPress pingback amplification target, threads
BOT Crawler emulation (robots.txt + sitemap) target, threads
💥 Amplification DNS / NTP / RDP Reflection attacks with reflectors target, reflector_list
CLDAP / MEM / CHAR Legacy protocol amplification target, reflector_list
ARD Apple Remote Desktop flood target, reflector_list
🛠️ Utilities Ping ICMP reachability check host
IP Info Geolocation and ISP lookup ip_address
Proxy Management Auto-download and validation from public lists fetch, validate
📊 Stats PPS / BPS Real-time packet/byte counters N/A
Color Output Severity-coded terminal logs N/A

📦 Installation

devilZERO is designed for ease of deployment across various Linux distributions, with a strong recommendation for security-focused environments like Kali Linux, Parrot OS, or Ubuntu.

Prerequisites

  • Python 3.8+
  • pip (Python package installer)
  • (Optional) Docker: For containerized deployment and isolation.

Method 1: Virtual Environment (Recommended for Kali Linux)

Using a Python virtual environment is the most secure and recommended approach, especially on systems with externally-managed-environment policies (e.g., Kali Linux). This prevents conflicts with system-wide Python packages.

# Clone the repository
git clone https://github.com/wavegxz-design/devilZERO.git
cd devilZERO

# Create and activate a virtual environment
python3 -m venv venv
source venv/bin/activate

# Install dependencies
pip install -r requirements.txt
pip install -e .

# Run devilZERO
devilzero

Method 2: Docker (Containerized Deployment)

For maximum isolation and portability, devilZERO can be run within a Docker container. This ensures all dependencies are self-contained and avoids system-level modifications.

# Clone the repository
git clone https://github.com/wavegxz-design/devilZERO.git
cd devilZERO

# Build the Docker image
docker build -t devilzero .

# Run devilZERO in a container
docker run -it devilzero

🚀 Usage

devilZERO offers both an interactive menu and direct CLI execution for its modules. After installation, simply run the devilzero command.

Interactive Menu

┌─[krypthane@redteam]─[~]
└──╼ $ devilzero

  ██████╗ ███████╗██╗   ██╗██╗     ██╗     ███████╗ ██████╗ ██████╗ 
  ██╔══██╗██╔════╝██║   ██║██║     ██║     ██╔════╝██╔═══██╗██╔══██╗
  ██║  ██║█████╗  ██║   ██║██║     ██║     █████╗  ██║   ██║██████╔╝
  ██║  ██║██╔══╝  ██║   ██║██║     ██║     ██╔══╝  ██║   ██║██╔══██╗
  ██████╔╝███████╗╚██████╔╝███████╗███████╗███████╗╚██████╔╝██║  ██║
  ╚═════╝ ╚══════╝ ╚═════╝ ╚══════╝╚══════╝╚══════╝ ╚═════╝ ╚═╝  ╚═╝

  devilZERO v1.0.0 — Modular DDoS Testing Toolkit
  by krypthane (wavegxz-design) — Ethical Hacking Only

  1. Layer 4 Attacks
  2. Layer 7 Attacks
  3. Amplification Attacks
  4. Utilities
  5. Proxy Management
  6. Exit

  Select an option: _

CLI Execution (Example: SYN Flood)

┌─[krypthane@redteam]─[~]
└──╼ $ devilzero layer4 syn --target 192.168.1.1 --port 80 --threads 100

  [INFO] Starting SYN Flood on 192.168.1.1:80 with 100 threads...
  [ATTACK] Sending SYN packet to 192.168.1.1:80 (Thread 1)
  [ATTACK] Sending SYN packet to 192.168.1.1:80 (Thread 2)
  ...
  [STATS] PPS: 1250 | BPS: 60000
  [STATUS] Attack in progress. Press Ctrl+C to stop.

🗺️ Roadmap

  • Advanced Evasion Techniques: Implement more sophisticated methods to bypass WAFs and anti-DDoS solutions.
  • Distributed Architecture: Support for multi-node attacks and botnet simulation (for authorized testing).
  • Reporting & Logging: Enhanced logging capabilities and automated report generation.
  • GUI Interface: Development of an optional graphical user interface for easier interaction.

👤 Author & Contact

devilZERO is developed and maintained by krypthane (wavegxz-design), a Red Team Operator and Open Source Developer focused on ethical security research and tool development.

Portfolio   GitHub   Telegram   Email


Ethical Hacking Only

About

devilZERO – Modular DDoS testing toolkit for authorized security assessments. Layer4 (TCP/UDP/SYN/Minecraft), Layer7 (HTTP floods), Amplification (DNS/NTP/RDP). Python, proxy support, interactive menu & CLI. Educational use only.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

No contributors