Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python(3.8).
Takedown WiFi access points, devices in your network, servers, services, and Bluetooth devices with ease.
Raven(abbreviation) is desinged to help you to test, understand, and learn from stress-testing attacks.
Raven can deal with strong servers and can be optimized for non typical targets.
Raven will fit your purpose, even if it is jamming down wifi networks or bluetooth devices.
I archived this repository because I currently do not want to work on it.
What makes it different
- Raven-Storm includes tools for creating shorcuts and working more efficiently.
- Raven is Effective and powerful in shutting down hosts and servers.
- Testing and understanding are the goals of Raven-Storm.
- Raven lets you connects clients together to create a botnet.
- Features different protocols such as UDP/TCP, ICMP, HTTP, L2CAP, ARP and IEEE.
Installation
Just enter the following line to install Raven-Storm on Linux.
curl -s https://raw.githubusercontent.com/Taguar258/Raven-Storm/master/install.sh | sudo bash -s
Or start your Unix terminal and type in following
(Expert)
sudo pkg/pacman/apt-get/brew install git python3 nmap python3-setuptools bluez dsniff iputils-ping aircrack-ng
git clone https://github.com/Taguar258/Raven-Storm/
cd Raven-Storm
sudo bash install_to_bin.sh
sudo rst
What module to use
Method | Module |
---|---|
ping | l3 |
udp/tcp services | l4 |
websites | l7 |
local devices | arp |
bluetooth | bl |
wifi | wifi |
botnet | server |
Try using the L4 attack if L7 fails.
Example
How to run a DDoS attack
You probably already know the difference between DoS and DDoS: A DoS Attack is run by a single Maschine and a DDoS Attack by multiple.
But how do we perform a DDoS Attack using Raven-Storm?
To connect multiple instances of Raven-Storm, you will then need to open a host. Just execute the command server
and define a custom password to prevent others from interfering. When run, you will receive a URL that you can connect to when executing the ddos
command.
Info and Warning
The user alone is responsible, be it: abusing raven-storm to fit illegal purposes or accidental damage caused by raven-storm. The creator did not intend raven-storm as a tool for illegal purposes and therefore does not support any illegal abuse of this tool. By using this software, you must agree to take full responsibility for damage caused by raven-storm in any way on your own. The creator does not want people to use raven-storm if they do not have experience with the attacks included. Every attack will cause temporary damage, but long-term damage is deffinitifly possible. Raven-storm should not suggest people to perform illegal activities.
The software is provided “as is”, without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software.
Raven-Storm (this link opens in a new window) by Taguar258 (this link opens in a new window)
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.