Finshir is a low and slow DDOS attack tool that uses coroutines to send data portions to a target web server.
--use-tor flag connects to your local SOCKS5 proxy running on 9050 port, which is typically used by Tor proxies.
Low & Slow techniques assume to be VERY SLOW, which means that you typically send a couple of bytes every N seconds. For instance, Finshir uses the 30 seconds interval by default, but it's modifiable as well: --write-periodicity option modifies this interval.
The default number of parallel connections is 1000. However, you can modify this limit using the --connections option, but be sure that your system is able to handle such amount of file descriptors: sudo ulimit -n 17015
By default, Finshir generates 100 empty spaces as data portions to send. You can override this behaviour by specifying your custom messages as a file, consisting of a single JSON array. --portions-file option specifies the path to your custom message file.
Consider specifying a custom verbosity level from 0 to 5 (inclusively), which is done by the --verbosity option. There is also the --date-time-format option which tells Finshir to use your custom date-time format. --date-time-format "%F" option uses a custom date-time format.
Initialisation of Finshir tool.
Errors in Finshir usage.
Verbose output of Finshir tool.
You are always welcome for any contribution to this project! But before you start, you should read the appropriate document to know about the preferred development process and the basic communication rules.
Like most of pentesting utilities, this project is developed, tested, and maintained for only Linux-based systems. If you are a Windows user, you probably need a virtual machine or another computer with GNU/Linux.
Finshir was developed as a means of testing stress resistance of web servers, and not for hacking, that is, the author of the project IS NOT RESPONSIBLE for any damage caused by your use of his program.
> Visit Finshir Website <