Linux

Impulse Denial-of-service ToolKit

Modern Denial-of-service ToolKit

Main Window

Impulse

Methods-

MethodTargetDescription
SMSPHONESends a massive amount of SMS messages and calls to a single target
EMAILEMAILSends a massive amount of Email messages to a target
NTPIP:PORTA SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack that aims to make a server unavailable to legitimate traffic by consuming all available server resources.
SYNIP:PORTA UDP flood is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond. The firewall protecting the targeted server can also become exhausted as a result of UDP flooding, resulting in a denial of service to legitimate traffic.
UDPIP:PORTSlowloris is a denial-of-service attack program that allows an attacker to overwhelm a targeted server by opening and maintaining many simultaneous HTTP connections between the attacker and the target.
POD (Ping of Death)IPPing of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.
ICMPIP:PORTPing flood, also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim’s computer by overwhelming it with ICMP echo requests, also known as pings.
HTTPURLHTTP Flood is a type of Distributed Denial of Service (DDoS) attack in which the attacker manipulates HTTP and POST unwanted requests in order to attack a web server or application. These attacks often use interconnected computers that have been taken over with the aid of malware such as Trojan Horses.
SlowlorisIP:PORTSlowloris is a denial-of-service attack program which allows an attacker to overwhelm a targeted server by opening and maintaining many simultaneous HTTP connections between the attacker and the target.
MemcachedIP:PORTA memcached distributed denial-of-service (DDoS) attack is a type of cyber attack in which an attacker attempts to overload a targeted victim with internet traffic. The attacker spoofs requests to a vulnerable UDP memcached* server, which then floods a targeted victim with internet traffic, potentially overwhelming the victim’s resources. While the target’s internet infrastructure is overloaded, new requests cannot be processed and regular traffic is unable to access the internet resource, resulting in denial-of-service.

Installation-

Windows:

  • Download Python 3.8 from here
  • Launch the installer, click Add Python to PATH
  • Download Impulse
  • Open cmd or PowerShell in the Impulse directory
  • Run this command: pip install -r requirements.txt
  • And this: python impulse.py –help

Linux:

  • sudo apt update
  • sudo apt install python3 python3-pip git -y
  • git clone https://github.com/LimerBoy/Impulse
  • cd Impulse/
  • pip3 install -r requirements.txt
  • python3 impulse.py –help

Termux:

  • pkg update
  • pkg install python3 python3-pip git -y
  • git clone https://github.com/LimerBoy/Impulse
  • cd Impulse/
  • pip3 install -r requirements.txt
  • python3 impulse.py –help

Example SMS & Call flood:

python3 impulse.py –method SMS –time 20 –threads 15 –target +380123456789

Aman Mishra

Aman Mishra is a eJPT certified and always keen to learn new concepts and methodologies regarding cybersecurity.he is also a cyber security content writer and have passion for sharing my knowledge about the latest threads and trends in the industry.

Recent Posts

CognitoHunter : A Comprehensive AWS Cognito Analysis Toolkit

CognitoHunter is a specialized toolkit designed for security researchers and penetration testers to analyze and…

2 hours ago

Axum : A High-Performance Web Framework For Rust

Axum is a high-performance, ergonomic, and modular web framework for Rust, designed to simplify the…

2 hours ago

Exploring The Tools And Functions Of “how2heap”

how2heap is a repository designed to teach and demonstrate various heap exploitation techniques. It provides…

2 hours ago

Polars : A High-Performance DataFrame Library

Polars is a cutting-edge DataFrame library designed for high-speed data manipulation and analysis. Written in…

2 hours ago

WinVisor : A Hypervisor-Based Emulator For Windows x64

WinVisor is a hypervisor-based emulator designed to emulate Windows x64 user-mode executables. It leverages the…

2 hours ago

Understanding CVE-2024-12084 And Its Exploitation

CVE-2024-12084 is a critical vulnerability in the widely-used Rsync tool, identified as a heap-based buffer…

3 hours ago