Thanks to visit codestin.com
Credit goes to github.com

Skip to content

KryzoxOfficial/Zillum-DDoS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation


⚔️ # Zillum-DDoS - Advanced HTTP DDoS Tool

A lightweight yet powerful Python-based HTTP flooder with real-time proxy handling, live status graphing, and fast configuration for stress testing and cybersecurity research.
Use strictly for legal and educational purposes only.


Screenshot

⚡ Features — Death by Packets

Multi-threaded HTTP Flood Engine

Automatic Proxy Rotation & Speed Checking

Random Path Fuzzer (/admin, /login, /secret, etc.)

Randomized User-Agents and Referers

Real-time Target Response Monitoring

Graceful Exit with Detailed Attack Stats

Supports IPs, Domains, and TLDs (.com, .pk, etc.)


⚙ Requirements — What You Need

Python 3.7+

Operating System: Kali Linux / Parrot OS / Any Linux Distro

Required Python Modules:

pip install requests colorama


🛠 Installation — Setting Up the Beast

Step 1: Update Linux Packages

sudo apt update && sudo apt upgrade -y

Step 2: Install Python 3 and Pip

sudo apt install python3 python3-pip -y

Step 3: Clone Kryzox Injected Repository

git clone https://github.com/KryzoxOfficial/Zillum-DDoS.git

Step 4: Enter the Directory

cd Zillum-DDoS

Step 5: Install Required Python Modules

pip3 install -r requirements.txt


🧩 Setting Up a Virtual Environment (Recommended)

Why Use a Virtual Environment?

Using a virtual environment (venv) isolates your dependencies and prevents any permission or conflict issues.

Step 1: Create a Virtual Environment

python3 -m venv venv

Step 2: Activate the Virtual Environment

source venv/bin/activate

On Windows:

.\venv\Scripts\activate

Step 3: Install Dependencies Inside Virtual Environment

pip install -r requirements.txt


❗ Common Errors & Fixes

Issue: Permission denied Error

Cause: Trying to install modules globally without appropriate permissions.

Solution:

  1. Using Virtual Environment (Recommended), or

  2. Install locally:

pip install --user -r requirements.txt


🚀 Usage — Launch the Attack

Run the following command:

python3 Zillum-DDoS.py

When prompted, enter the details:

🌐 Target URL/IP: http://example.com

🔥 Port: 80

⏳ Duration (seconds): 60

🚀 Threads: 200

Then sit back and unleash mayhem!


🧠 How It Works — Under the Hood

Massive HTTP flood with dynamic proxy rotation.

Randomized headers and referrers to bypass Web Application Firewalls (WAFs).

Random path fuzzing to confuse firewalls.

Custom multi-thread engine to maximize CPU utilization.

Real-time server response tracking to monitor server health during the attack.


⚠ Disclaimer — Read Before You Bleed

This tool is intended for:

Ethical Hacking

Server Stress Testing

Educational Purposes Only

WARNING: We are NOT responsible for any misuse. Only use this on servers you own or have explicit permission to test.


🔥 Credits

"Zillum Injected Chaos: The silence after the storm..."


⚖ License

License: MIT


Releases

No releases published

Packages

No packages published