DragonAttacker is an educational network diagnostic tool designed for testing network security and resilience. It simulates various types of network traffic for authorized penetration testing and security research purposes only.
⚠️ IMPORTANT LEGAL DISCLAIMER: This tool is provided for EDUCATIONAL PURPOSES ONLY. Using this tool against targets without explicit permission is ILLEGAL and may result in criminal charges or civil liability. You are solely responsible for your actions when using this tool.
- Multiple Attack Vectors: Supports UDP Flood, TCP SYN Flood, HTTP Flood, Slowloris, and ICMP Flood attacks
- Smart Target Selection: Intelligently chooses the most effective attack method based on the target service
- Interactive Setup: User-friendly terminal interface to configure attack parameters
- Real-time Statistics: Live monitoring of attack effectiveness with packet and data rates
- Advanced Encryption: Implements sophisticated crypto techniques with automatic key rotation
- Anonymization Options: Built-in traffic anonymization capabilities
- Dynamic Resource Management: Automatically manages system resources to maintain stability
- Python 3.7+
- Linux-based operating system (Some features require root privileges)
- Required Python packages:
- socket
- ssl
- multiprocessing
- hashlib
- struct
- asyncio
- psutil (for resource monitoring)
- Clone this repository:
git clone https://github.com/DV64/DragonAttacker.git
cd DragonAttacker- Install the required dependencies:
pip install -r requirements.txt- Run the script with Python:
python DragonAttacker.py- For full functionality (some attack methods require root privileges):
sudo python DragonAttacker.py-
Follow the interactive prompts to configure your target and attack parameters.
-
Press
Ctrl+Cto stop the attack at any time.
DragonAttacker includes several sophisticated attack methods for network diagnostics:
Sends a high volume of UDP packets to the target to consume bandwidth and resources.
Exploits the TCP handshake process by sending numerous SYN packets without completing the handshake.
Sends legitimate-looking HTTP requests to web servers, mimicking normal browser behavior.
Maintains many connections to the target web server by sending partial requests, eventually exhausting the server's connection pool.
Overwhelms the target with ICMP Echo Request packets (ping flood).
DragonAttacker implements advanced cryptographic techniques:
- 256-bit AES encryption for payload protection
- Multiple cipher modes (CTR, CFB, OFB) with automatic rotation
- HMAC-SHA512 for message authentication
- Automatic key rotation for enhanced security
When using DragonAttacker for legitimate security testing:
- Always obtain written permission before testing any system
- Document the scope of your testing
- Limit the duration of your tests
- Monitor for unintended consequences
- Report findings responsibly to the system owner
Contributions to improve DragonAttacker are welcome! Please follow these steps:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add some amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
DV64 - @DV64_GitHub
Project Link: https://github.com/DV64/DragonAttacker
