Categories: Kali Linux

Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood

Wreckuests is a script, which enables you to run DDoS attacks with HTTP-flood. It’s composed in unadulterated Python and utilization proxy servers as bots. This script isn’t all inclusive and you can’t simply drop Pentagon/NSA/whatever site with only a solitary mouse click. Each attack is one of a kind, and for every site you’d have to look for vulnerabilities and glory them.

Warning: This content is distributed for educational purposes as it were! Creator will acknowledge no obligation regarding any outcomes, harm or misfortune which may result from utilize.

Also Read Homoglyphs – Get Similar Letters, Convert To ASCII, Detect Possible Languages & UTF-8 Group

Wreckuests Features

  1. Cache bypass with URL parameters randomization
  2. CloudFlare detection and notification of
  3. Automatic gzip/deflate toggling
  4. HTTP Authentication bypass
  5. UserAgent substitution
  6. Referers randomizer
  7. HTTP proxy support

Requirements

  • Python 3.5+
  • Requests 2.10.0 or higher
  • Netaddr tested with 0.7.19

Installation

Just clone repository in the desired directory and run the installation script:

chmod +x install.sh
./install.sh

Usage

Type under sudo mode:

python3 wreckuests.py -v <target url> -a <login:pass> -t <timeout>

Possible parameters:

-h or --help:

Prints a message with possible parameters.

-v or --victim:

Specifies a link to the victim’s site page. It could be the website’s main page, someone’s profile, .php-file or even image. Everything that has a lot of weight or is hard for server to give. The choice is yours.

-a or --auth:

Parameter for bypassing authentication. Your victim could enable basic HTTP authentication and his website will ask you to enter login and password in popup window. Victim may previously publish login and password data for his users in VK/FB/Twitter and whatever social network.

-t or --timeout(default: 10):

Parameter to control connection ‘n’ read timeout. This option also controls terminating time.

Note: if you set timeout=1 or somewhere about 2-3 seconds, the slow proxies will not have any time to even connect to your victim’s website and will not even hit it. If you sure your proxies are fast enough

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

6 hours ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

6 hours ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

2 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago