CC-attack is a powerful Python3 script designed for conducting Layer 7 DDoS attacks, specifically HTTP-flood and HTTPS-flood, leveraging SOCKS4/5 or HTTP proxies. It offers a range of features to simulate human-like attack patterns, making it effective for testing web server resilience.
Key Features:
- Multiple HTTP Modes: Supports HTTP GET, HEAD, POST, and Slow Flood attack modes.
- Proxy Support: Utilizes SOCKS4, SOCKS5, and HTTP proxies for anonymized attacks.
- Proxy Management: Includes built-in functionalities for downloading and checking the validity of SOCKS4/5 proxies.
- Customization: Allows for random HTTP headers and data, as well as custom cookies and POST data, to evade detection.
- HTTPS Support: Capable of attacking HTTPS servers.
- Multithreading: Designed for multithreading to maximize attack volume.
- Multi-processing Script: Provides a
multiproc.shscript for Linux users to runcc.pymultiple times, effectively achieving multi-processing and boosting performance.
Use Cases:
- Security researchers and penetration testers can use CC-attack to assess the robustness of web applications and infrastructure against Layer 7 denial-of-service attacks.
- Red team operations can simulate real-world HTTP/HTTPS flood scenarios to identify weaknesses in target systems' defenses.




