Skip to content

A lightweight Python-based penetration testing utility developed as a graduation project during my cybersecurity diploma. Designed to simulate select denial-of-service (DoS) attack vectors including TCP flooding and DHCP starvation, this tool offers a streamlined command-line experience similar to hping.

Notifications You must be signed in to change notification settings

Sonialr7iny/PentestDoS_tool

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

10 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Pentest Tool

A lightweight and educational penetration testing utility built with Python and Scapy. Developed as a graduation project during my cybersecurity diploma, this tool mimics core features of hping and focuses on specific denial-of-service (DoS) attack vectors.

πŸš€ Features

  • Simulates TCP flood attacks on target IP addresses
  • DHCP starvation module for network resource exhaustion
  • Custom packet crafting using Scapy
  • CLI-style operation (no need to call python3)
  • Built for and tested on Kali Linux

πŸ”§ Usage

After installation, run the tool using:

DoS SYN -s -t  <target_ip>
DoS ACK -a -t <target_ip>
DoS ICMP -i -t  <target_ip>
DoS DHCP d

🧰 Tech Stack

-Python 3 -Scapy -Kali Linux (for development & testing)

πŸ“¦ Installation

To install as a globally accessible command-line tool: chmod +x DoS sudo mv DoS /usr/local/bin/

Now you can invoke it directly:

DoS SYN -s -t 127.0.0.1

πŸ–ΌοΈ Sample Output

ACK Flood Test

tcp_ack_demo

DHCP Starvation

tsp_syn_demo

Demo runs performed on isolated local test network

πŸ§‘β€πŸ’» About the Project

This project was developed as part of our final graduation requirement for a cybersecurity diploma. It served as a practical learning exercise in packet manipulation, network-based DoS techniques, and ethical tool design. Built collaboratively with classmates, it demonstrates both technical skill and academic achievemen

⚠️ Disclaimer

This tool is intended strictly for educational purposes. Do not use it on networks or devices without explicit permission. Unauthorized use may be illegal.

πŸ“¬ Contact

If you'd like to collaborate, contribute, or ask questions, feel free to open an issue or reach out!

About

A lightweight Python-based penetration testing utility developed as a graduation project during my cybersecurity diploma. Designed to simulate select denial-of-service (DoS) attack vectors including TCP flooding and DHCP starvation, this tool offers a streamlined command-line experience similar to hping.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages