TCPcannon is a Linux tool for launching network attacks. It is built on top of RawTCP, my library to manage network packets and raw sockets.
The purpose of this development is to reproduce real network attacks using only the C language and with minimal dependencies.
Currently it only incorporates a SYN flooding module with and without spoofing, but more attacking modules and modes will come in later updates.
The name is a reference to the LOIC.
You can download the binary file for TCPcannon here.
Run ./TCPcannon -h to get tool usage:
Note: As stated in the library RawTCP, raw sockets require root proviliges to be used, so you will need them before running any of these examples.
./TCPcannon -S -m direct -d 192.168.1.1:8000
Source IP changes randomly between each sent packet.
./TCPcannon -S -m spoof -d 192.168.1.1:8000
You will get the number of packets sent and packets/minute.
./TCPcannon -S -m benchmark -d 192.168.1.1:8000
Whether it is a bug, question or suggestion, please open a ticket and I will have a look at it as fast as I possibly can.
This software is licensed under the MIT license. See LICENSE