Skip to content

A simple Python script to initiate a Ping Flood attack against a target IP address, using a range of spoofed IP addresses

Notifications You must be signed in to change notification settings

RossCampbellDev/ScapyPingFlood

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

usage: PingFlood.py [-h] [-t victim] [-n [numPings]] [-m [mask]]

Begin pinging random IP addresses, spoofing the source address to flood a target with ICMP responses

optional arguments: -h, --help show this help message and exit -t victim the target IPv4 address -n [numPings] the number of random addresses to send the spoofed pings to -m [mask] subnet mask for addresses to ping

example: ./PingFlood.py -t 192.168.0.1 -n 1000 -m 123.123.0.0/22 this will ping 192.168.0.1, spoofing the source addresses between 123.123.0.0 to 123.123.3.255 (i think? haha)

About

A simple Python script to initiate a Ping Flood attack against a target IP address, using a range of spoofed IP addresses

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages