A Python tool that automates DDoS attacks through the Tor network for security testing and education.
TorDDos is a Python tool that automates distributed denial-of-service (DDoS) attacks by routing traffic through the Tor network. It creates and releases Tor sessions to repeatedly make requests to target websites, simulating attack patterns while maintaining anonymity. The tool is designed for security testing and educational purposes to help researchers understand DDoS vulnerabilities.
Security researchers, penetration testers, and cybersecurity educators who need to simulate DDoS attacks in controlled, authorized testing environments.
Developers choose TorDDos because it provides an automated way to test DDoS vulnerabilities while leveraging Tor's anonymity features, making it suitable for ethical security assessments where traffic source obfuscation is important.
DDoS attacks over Tor
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Automatically creates and releases Tor sessions to route attack traffic, providing inherent anonymity for ethical testing without manual proxy setup.
Offers straightforward command-line parameters for target specification and attack attempts, making it easy to deploy for basic simulations.
Designed with security awareness in mind, including a legal disclaimer that emphasizes authorized use, ideal for controlled training scenarios.
Configures and runs multiple attack attempts automatically via the -n parameter, reducing manual effort in repetitive testing.
Relies on Python 2.7, which is outdated and unsupported, introducing security vulnerabilities and compatibility issues with modern systems.
Requires a Linux system and Tor service, excluding native use on Windows or macOS and adding setup overhead for non-Linux users.
Only supports simple HTTP request flooding without advanced features like multi-vector attacks, performance metrics, or custom payloads.
Last updated in 2019 with no recent maintenance, indicating potential bugs, lack of support, and incompatibility with newer Tor or library versions.