Impulse Denial-of-service ToolKit

Modern Denial-of-service ToolKit

Main Window

Impulse

Methods-

MethodTargetDescription
SMSPHONESends a massive amount of SMS messages and calls to a single target
EMAILEMAILSends a massive amount of Email messages to a target
NTPIP:PORTA SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack that aims to make a server unavailable to legitimate traffic by consuming all available server resources.
SYNIP:PORTA UDP flood is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond. The firewall protecting the targeted server can also become exhausted as a result of UDP flooding, resulting in a denial of service to legitimate traffic.
UDPIP:PORTSlowloris is a denial-of-service attack program that allows an attacker to overwhelm a targeted server by opening and maintaining many simultaneous HTTP connections between the attacker and the target.
POD (Ping of Death)IPPing of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.
ICMPIP:PORTPing flood, also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim’s computer by overwhelming it with ICMP echo requests, also known as pings.
HTTPURLHTTP Flood is a type of Distributed Denial of Service (DDoS) attack in which the attacker manipulates HTTP and POST unwanted requests in order to attack a web server or application. These attacks often use interconnected computers that have been taken over with the aid of malware such as Trojan Horses.
SlowlorisIP:PORTSlowloris is a denial-of-service attack program which allows an attacker to overwhelm a targeted server by opening and maintaining many simultaneous HTTP connections between the attacker and the target.
MemcachedIP:PORTA memcached distributed denial-of-service (DDoS) attack is a type of cyber attack in which an attacker attempts to overload a targeted victim with internet traffic. The attacker spoofs requests to a vulnerable UDP memcached* server, which then floods a targeted victim with internet traffic, potentially overwhelming the victim’s resources. While the target’s internet infrastructure is overloaded, new requests cannot be processed and regular traffic is unable to access the internet resource, resulting in denial-of-service.

Installation-

Windows:

  • Download Python 3.8 from here
  • Launch the installer, click Add Python to PATH
  • Download Impulse
  • Open cmd or PowerShell in the Impulse directory
  • Run this command: pip install -r requirements.txt
  • And this: python impulse.py –help

Linux:

  • sudo apt update
  • sudo apt install python3 python3-pip git -y
  • git clone https://github.com/LimerBoy/Impulse
  • cd Impulse/
  • pip3 install -r requirements.txt
  • python3 impulse.py –help

Termux:

  • pkg update
  • pkg install python3 python3-pip git -y
  • git clone https://github.com/LimerBoy/Impulse
  • cd Impulse/
  • pip3 install -r requirements.txt
  • python3 impulse.py –help

Example SMS & Call flood:

python3 impulse.py –method SMS –time 20 –threads 15 –target +380123456789

Aman Mishra

Aman Mishra is a eJPT certified and always keen to learn new concepts and methodologies regarding cybersecurity.he is also a cyber security content writer and have passion for sharing my knowledge about the latest threads and trends in the industry.

Recent Posts

Command-Line Techniques for Listing Linux Users

Linux offers powerful command-line tools for system administrators to view and manage user accounts. Knowing…

21 hours ago

Exploring User Management in Linux Systems

User management is a critical aspect of Linux administration. Each user in a Linux system…

21 hours ago

How to List Users in Linux

Managing users is an essential part of Linux system administration. Knowing how to list all…

21 hours ago

Nmap cheat sheet for beginners

Nmap (Network Mapper) is a free tool that helps you find devices on a network,…

3 days ago

Understanding the Model Context Protocol (MCP) and How It Works

Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open…

1 week ago

The file Command – Quickly Identify File Contents in Linux

While file extensions in Linux are optional and often misleading, the file command helps decode what a…

1 week ago