π Powered by BANGLADESH CYBER SQUAD and TEAM SHADOW STRIKER
π Year: 2025
DOOM CANNON is a hybrid CLI toolkit built with Python π and Go π.
It provides a centralized menu system (Python Rich + PyFiglet) to launch multiple Go-powered modules.
Each module has customizable options (target, port, threads, duration, proxy, headers, etc.).
The authors take no responsibility for misuse.
- Interactive CLI with styled menus
- Python-based launcher with Rich UI
- Multiple Go-based modules for different modes
- Custom input support (target, threads, proxy, headers, wordlists)
- Modular structure β easy to add new Go tools
- BLACK ZERO
- FULL MOON
- MR. CODE ERROR
- TAUSIF ZAMAN
- PAEVES JOY
- Kazi Tanvir Mahmud Omi
- SHAWON ISLAM SAIM
- PARVIS HASAN
pkg update && pkg upgrade
pkg install coreutils -y
pkg install grep -y
pkg install libcaca -y
pkg install python -y
pkg install python3 -y
pkg install golang -y
pkg install git
rm -rf DooM-CANNON
git clone https://github.com/TEAMBCS/DooM-CANNON.git
cd DooM-CANNON
chmod 777 *
chmod +x *
pip3 install -r requirements.txtTermux ->
python3 setup.pyKali Linux ->
python3 setup-kali.pyPYTHON language launcher
python3 doom-cannon.pyGO language launcher
go run doom-cannon.goSHELL language launcher
bash doom-cannon.shYou will see a CLI menu with available modules.
Select an option (e.g., 01/A for ORBIT Attack) and follow the prompts.
*as you wish* user name is not fix use random name.DOOM CANNON@TEAM BCSThese headers are used when sending requests to a target.
Important: Change the values according to your target server.
headers = {
Host: victim.com
Origin: https://victim.com
Referer: https://www.google.com/
X-Forwarded-For: 45.76.89.120
X-Forwarded-Host: victim.com
X-Forwarded-Proto: https
X-Real-IP: 203.23.101.55
Client-IP: 149.56.210.87
Forwarded: for=185.12.44.201;proto=https;by=198.51.100.200
CF-Connecting-IP: 91.132.137.45
True-Client-IP: 64.233.160.2
X-Originating-IP: 212.102.44.98
X-Cluster-Client-IP: 103.21.244.15
X-Requested-With: XMLHttpRequest
X-Forwarded-Server: edge-proxy-1
X-Request-ID: 123456789
Via: 2.0 proxy
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.8
Accept-Encoding: gzip, deflate, br
Cache-Control: no-cache
Pragma: no-cache
Connection: keep-alive
TE: trailers
Upgrade-Insecure-Requests: 1
DNT: 1
# Add or modify other headers as needed
}DooM-CANNON/
β
βββ doom_cannon.py # Main Python language launcher (menu, UI, input handling)
βββ doom_cannon.go # Go language launcher (menu, UI, input handling)
βββ doom_cannon.sh # Shell language launcher (menu, UI, input handling)
β
βββ orbit.go # Orbit Attack (TLS-based)
β ββ Inputs: host, port, method [GET/POST], threads, duration, debug, proxy, header
β
βββ axis.go # Axis Attack (TLS-based)
β ββ Inputs: url, port, method [GET/POST], threads, duration, debug, proxy
β
βββ viod.go # Viod Attack
β ββ Inputs: url, port, threads, method, duration, proxy, wordlist, header
β
βββ noise.go # Noise Attack
β ββ Inputs: url, threads, method, duration, proxy, header
β
βββ ghost.go # Ghost Attack
β ββ Inputs: url, port, threads, method, duration, proxy, wordlist
β
βββ xiron.go # Xiron Attack
β ββ Inputs: url, threads, method, duration, proxy
β
βββ orix.go # Orix Attack
β ββ Inputs: url, port, threads, method, duration, proxy
β
βββ orrin.go # Orrin Attack
β ββ Inputs: site, safe_mode [y/n]
β
βββ viont.go # Viont Attack (Flood mode)
β ββ Inputs: url, port, threads, method, duration, header
β
β
βββ proxy.txt # Optional proxy list
βββ header.txt # Optional custom headers
βββ wordlist # Optional wordlist for specific modules
MIT License @ copyright 2025