Raven-Storm Powerful DDoS toolkit Pentesting
Raven-Storm Powerful DDoS toolkit Pentesting

Raven-Storm: Powerful DDoS toolkit for Pentesting

Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python(3.8).

Takedown WiFi access points, devices in your network, servers, services, and Bluetooth devices with ease.

Raven(abbreviation) is desinged to help you to test, understand, and learn from stress-testing attacks.

Raven can deal with strong servers and can be optimized for non typical targets.


Raven will fit your purpose, even if it is jamming down wifi networks or bluetooth devices.

I archived this repository because I currently do not want to work on it.

Capture Raven-Storm
Capture Raven-Storm

What makes it different

  • Raven-Storm includes tools for creating shorcuts and working more efficiently.
  •  Raven is Effective and powerful in shutting down hosts and servers.
  •  Testing and understanding are the goals of Raven-Storm.
  •  Raven lets you connects clients together to create a botnet.
  •  Features different protocols such as UDP/TCP, ICMP, HTTP, L2CAP, ARP and IEEE.


Just enter the following line to install Raven-Storm on Linux.

curl -s https://raw.githubusercontent.com/Taguar258/Raven-Storm/master/install.sh | sudo bash -s
Install Raven-Storm
Install Raven-Storm

Or start your Unix terminal and type in following


sudo pkg/pacman/apt-get/brew install git python3 nmap python3-setuptools bluez dsniff iputils-ping aircrack-ng

git clone https://github.com/Taguar258/Raven-Storm/

cd Raven-Storm

sudo bash install_to_bin.sh

sudo rst

What module to use

udp/tcp servicesl4
local devicesarp

Try using the L4 attack if L7 fails.


Example DDoS
Example DDoS

How to run a DDoS attack

You probably already know the difference between DoS and DDoS: A DoS Attack is run by a single Maschine and a DDoS Attack by multiple.

But how do we perform a DDoS Attack using Raven-Storm?

To connect multiple instances of Raven-Storm, you will then need to open a host. Just execute the command server and define a custom password to prevent others from interfering. When run, you will receive a URL that you can connect to when executing the ddos command.


Info and Warning


The creator (taguar258) of the raven-storm toolkit does not take any responsibility for damage caused.

The user alone is responsible, be it: abusing raven-storm to fit illegal purposes or accidental damage caused by raven-storm. The creator did not intend raven-storm as a tool for illegal purposes and therefore does not support any illegal abuse of this tool. By using this software, you must agree to take full responsibility for damage caused by raven-storm in any way on your own. The creator does not want people to use raven-storm if they do not have experience with the attacks included. Every attack will cause temporary damage, but long-term damage is deffinitifly possible. Raven-storm should not suggest people to perform illegal activities.

The software is provided “as is”, without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software.

Dark Mode

Raven-Storm (this link opens in a new window) by Taguar258 (this link opens in a new window)

Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.