Skip to content

DDoS a WordPress login page with a flood of fake account details

License

Notifications You must be signed in to change notification settings

Spl0itable/wordpress-ddos-login-flooder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

WordPress Login Flooder (DDoS)

A simple Python script to flood a WordPress login page with fake credentials using multithreading in order to DDoS the site, through bypassing any caching layer and stressing the database and webserver.

Features

  • Cycles through random, anonymous proxies from the scraped proxy list using the fp (free-proxy) library to obfuscate your IP
  • Generates fake IP addresses, user agents, and credentials using the faker library
  • Sends spoofed X-Forwarded-For, Fastly-Client-IP, and CF-Connecting-IP headers to further obfuscate (Note: this will only work if server WAF/VCL is misconfigured and doesn't drop incoming headers)
  • Utilizes the requests library to make POST requests to the specified login page URL
  • Uses the termcolor library to print in different colors the success (green) and error (red) messages
  • Runs indefinitely with multiple threads concurrently to increase the rate of DDoS attempts

Requirements

Using pip install

  • requests
  • termcolor
  • faker
  • free-proxy

Usage

python3 wp_login_flooder.py

Enter the URL to the WordPress login page when prompted. The script will then continuously flood the login page with fake credentials using 100 concurrent threads. Successful login attempts and errors will be reported in the console.

Note: This script is for educational purposes only and should not be used for malicious activities. The author is not responsible for any damages or consequences that may result from using this script.

About

DDoS a WordPress login page with a flood of fake account details

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages