Finshir

A coroutines-driven Low & Slow traffic generator, written in Rust.
Finshir logo

Finshir


Description

Finshir is a low and slow DDOS attack tool that uses coroutines to send data portions to a target web server.


Options


Using the Tor network

--use-tor flag connects to your local SOCKS5 proxy running on 9050 port, which is typically used by Tor proxies.


Test intensity

Low & Slow techniques assume to be VERY SLOW, which means that you typically send a couple of bytes every N seconds. For instance, Finshir uses the 30 seconds interval by default, but it's modifiable as well: --write-periodicity option modifies this interval.


Connections count

The default number of parallel connections is 1000. However, you can modify this limit using the --connections option, but be sure that your system is able to handle such amount of file descriptors: sudo ulimit -n 17015


Custom data portions

By default, Finshir generates 100 empty spaces as data portions to send. You can override this behaviour by specifying your custom messages as a file, consisting of a single JSON array. --portions-file option specifies the path to your custom message file.


Logging options

Consider specifying a custom verbosity level from 0 to 5 (inclusively), which is done by the --verbosity option. There is also the --date-time-format option which tells Finshir to use your custom date-time format. --date-time-format "%F" option uses a custom date-time format.



Initialisation

Initialisation of Finshir tool.


Errors

Errors in Finshir usage.


Being verbose

Verbose output of Finshir tool.


Contributing

You are always welcome for any contribution to this project! But before you start, you should read the appropriate document to know about the preferred development process and the basic communication rules.


Target platform

Like most of pentesting utilities, this project is developed, tested, and maintained for only Linux-based systems. If you are a Windows user, you probably need a virtual machine or another computer with GNU/Linux.


Finshir was developed as a means of testing stress resistance of web servers, and not for hacking, that is, the author of the project IS NOT RESPONSIBLE for any damage caused by your use of his program.





> Visit Finshir Website <