LogoHackDB
RecentCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  1. Home
  2. Items
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
  • CC-attack
  • icon of CC-attack

    CC-attack

    A Python3 script for performing multithreading HTTP/HTTPS flood (CC) attacks using SOCKS4/5 or HTTP proxies.

    Visit WebsiteShare on X
    image of CC-attack
    Visit Website

    Introduction

    CC-attack is a powerful Python3 script designed for conducting Layer 7 DDoS attacks, specifically HTTP-flood and HTTPS-flood, leveraging SOCKS4/5 or HTTP proxies. It offers a range of features to simulate human-like attack patterns, making it effective for testing web server resilience.

    Key Features:

    • Multiple HTTP Modes: Supports HTTP GET, HEAD, POST, and Slow Flood attack modes.
    • Proxy Support: Utilizes SOCKS4, SOCKS5, and HTTP proxies for anonymized attacks.
    • Proxy Management: Includes built-in functionalities for downloading and checking the validity of SOCKS4/5 proxies.
    • Customization: Allows for random HTTP headers and data, as well as custom cookies and POST data, to evade detection.
    • HTTPS Support: Capable of attacking HTTPS servers.
    • Multithreading: Designed for multithreading to maximize attack volume.
    • Multi-processing Script: Provides a multiproc.sh script for Linux users to run cc.py multiple times, effectively achieving multi-processing and boosting performance.

    Use Cases:

    • Security researchers and penetration testers can use CC-attack to assess the robustness of web applications and infrastructure against Layer 7 denial-of-service attacks.
    • Red team operations can simulate real-world HTTP/HTTPS flood scenarios to identify weaknesses in target systems' defenses.
    Back

    Information

    • Publisher
      Admin
    • Websitegithub.com
    • Created date03/01/2026
    • Published date03/01/2026

    Categories

    • Red Team Operations
    • Infrastructure Security

    Tags

    • DoS

    More Resources

    image of PentAGI
    AI SecurityApplication SecurityInfrastructure SecurityReconnaissance
    Visit Website

    PentAGI

    Details

    Autonomous AI agent system for complex penetration testing, integrating security tools, long-term memory, and smart task delegation in sandboxed Docker.

    AIOSINTWebInternalExternal
    image of IronPE
    Exploit DevelopmentInfrastructure SecurityRed Team Operations
    Visit Website

    IronPE

    Details

    Rust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.

    Internal
    image of Lab401
    Wireless SecurityPhysical SecurityRed Team OperationsReverse Engineering
    Visit Website

    Lab401

    Details

    Premier hardware store for offensive security, providing Flipper Zero, Proxmark, Hak5 tools, SDR equipment, and specialized RFID cloning hardware.

    WirelessPhysicalInternal