Linux

Impulse Denial-of-service ToolKit

Modern Denial-of-service ToolKit

Main Window

Impulse

Methods-

MethodTargetDescription
SMSPHONESends a massive amount of SMS messages and calls to a single target
EMAILEMAILSends a massive amount of Email messages to a target
NTPIP:PORTA SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack that aims to make a server unavailable to legitimate traffic by consuming all available server resources.
SYNIP:PORTA UDP flood is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond. The firewall protecting the targeted server can also become exhausted as a result of UDP flooding, resulting in a denial of service to legitimate traffic.
UDPIP:PORTSlowloris is a denial-of-service attack program that allows an attacker to overwhelm a targeted server by opening and maintaining many simultaneous HTTP connections between the attacker and the target.
POD (Ping of Death)IPPing of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.
ICMPIP:PORTPing flood, also known as ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a victim’s computer by overwhelming it with ICMP echo requests, also known as pings.
HTTPURLHTTP Flood is a type of Distributed Denial of Service (DDoS) attack in which the attacker manipulates HTTP and POST unwanted requests in order to attack a web server or application. These attacks often use interconnected computers that have been taken over with the aid of malware such as Trojan Horses.
SlowlorisIP:PORTSlowloris is a denial-of-service attack program which allows an attacker to overwhelm a targeted server by opening and maintaining many simultaneous HTTP connections between the attacker and the target.
MemcachedIP:PORTA memcached distributed denial-of-service (DDoS) attack is a type of cyber attack in which an attacker attempts to overload a targeted victim with internet traffic. The attacker spoofs requests to a vulnerable UDP memcached* server, which then floods a targeted victim with internet traffic, potentially overwhelming the victim’s resources. While the target’s internet infrastructure is overloaded, new requests cannot be processed and regular traffic is unable to access the internet resource, resulting in denial-of-service.

Installation-

Windows:

  • Download Python 3.8 from here
  • Launch the installer, click Add Python to PATH
  • Download Impulse
  • Open cmd or PowerShell in the Impulse directory
  • Run this command: pip install -r requirements.txt
  • And this: python impulse.py –help

Linux:

  • sudo apt update
  • sudo apt install python3 python3-pip git -y
  • git clone https://github.com/LimerBoy/Impulse
  • cd Impulse/
  • pip3 install -r requirements.txt
  • python3 impulse.py –help

Termux:

  • pkg update
  • pkg install python3 python3-pip git -y
  • git clone https://github.com/LimerBoy/Impulse
  • cd Impulse/
  • pip3 install -r requirements.txt
  • python3 impulse.py –help

Example SMS & Call flood:

python3 impulse.py –method SMS –time 20 –threads 15 –target +380123456789

Aman Mishra

Aman Mishra is a eJPT certified and always keen to learn new concepts and methodologies regarding cybersecurity.he is also a cyber security content writer and have passion for sharing my knowledge about the latest threads and trends in the industry.

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

6 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

6 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago