[+] Program sucessfully installed!
############################################
1> I'm not responsible for your actions
2> This program is developed only for legal purposes
3> When using this program you are aware that only you are responsible for your actions and they may have consequences
4 > Tool developed for pentesters and students
############################################
(1) ddos
(2) bruteforce
(3) payloads
[+]flood/http
[+]flood/tcp
[+]flood/udp
Options:
url .... target to attack
lazy/ddos/flood/http# set url=http://google.com
ddos/flood/http:
[+] url = http://google.com
[+] Sending request 19037 to http://google.com
! host is down or unavailable