# Saddam **Repository Path**: CangShui/Saddam ## Basic Information - **Project Name**: Saddam - **Description**: DDoS Amplification Tool - **Primary Language**: Python - **License**: Apache-2.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2018-06-04 - **Last Updated**: 2020-12-19 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Saddam DDoS Tool that supports: * DNS Amplification (Domain Name System) * NTP Amplification (Network Time Protocol) * SNMP Amplification (Simple Network Management Protocol) * SSDP Amplification (Simple Service Discovery Protocol) ![](http://2.bp.blogspot.com/-TkNwFJsznto/VOs3l0uSgDI/AAAAAAAAALQ/S5BNt8ULwpg/s1600/9.png) Read more about DDoS Amplification Attacks [here](http://www.pythonforpentesting.com/2015/02/ddos-amplification-attacks.html) Donation would be much appreciated: 1Gi5Rpz5RBEUpGknSwyRgqzk7b5bQ7Abp2 # Requierments * OS Supports raw sockets * Python 2.7 * [Pinject](https://github.com/OffensivePython/Pinject) # Usage ``` _____ __ __ / ___/____ _____/ /___/ /___ _____ ___ \__ \/ __ `/ __ / __ / __ `/ __ `__ \ ___/ / /_/ / /_/ / /_/ / /_/ / / / / / / /____/\__,_/\__,_/\__,_/\__,_/_/ /_/ /_/ https://github.com/OffensivePython/Saddam https://twitter.com/OffensivePython Usage: Saddam.py target.com [options] # DDoS Saddam.py benchmark [options] # Calculate AMPLIFICATION factor Options: -h, --help show this help message and exit -d FILE:FILE|DOMAIN, --dns=FILE:FILE|DOMAIN DNS Amplification File and Domains to Resolve (e.g: dns.txt:[evildomain.com|domains_file.txt] -n FILE, --ntp=FILE NTP Amplification file -s FILE, --snmp=FILE SNMP Amplification file -p FILE, --ssdp=FILE SSDP Amplification file -t N, --threads=N Number of threads (default=1) ```