ddoSutil | ddos utilities ) is a series of Linux scripts
kandi X-RAY | ddoSutil Summary
kandi X-RAY | ddoSutil Summary
ddoSutil is a Shell library. ddoSutil has no bugs, it has no vulnerabilities and it has low support. You can download it from GitHub.
ddoSutil is a project aimed at dealing with ddos attacks on Linux systems. Since many ddos attacks differ in complexity, the objective is to provide a variety of utilities to deal with different types of attacks. Created to be as portable as possible without requirements, developed mostly in bash (with a until or two in Perl). Tested on CentOS and Debian should function with no or minimal effort on most Linux distributions. Actively maintained please submit issues, feedback and suggestions; or e-mail russ -at- vigeek.net.
ddoSutil is a project aimed at dealing with ddos attacks on Linux systems. Since many ddos attacks differ in complexity, the objective is to provide a variety of utilities to deal with different types of attacks. Created to be as portable as possible without requirements, developed mostly in bash (with a until or two in Perl). Tested on CentOS and Debian should function with no or minimal effort on most Linux distributions. Actively maintained please submit issues, feedback and suggestions; or e-mail russ -at- vigeek.net.
Support
Quality
Security
License
Reuse
Support
ddoSutil has a low active ecosystem.
It has 12 star(s) with 5 fork(s). There are 5 watchers for this library.
It had no major release in the last 6 months.
There are 1 open issues and 0 have been closed. There are 1 open pull requests and 0 closed requests.
It has a neutral sentiment in the developer community.
The latest version of ddoSutil is current.
Quality
ddoSutil has no bugs reported.
Security
ddoSutil has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
License
ddoSutil does not have a standard license declared.
Check the repository for any license declaration and review the terms closely.
Without a license, all rights are reserved, and you cannot use the library in your applications.
Reuse
ddoSutil releases are not available. You will need to build from source code and install.
Installation instructions are available. Examples and code snippets are not available.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of ddoSutil
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of ddoSutil
ddoSutil Key Features
No Key Features are available at this moment for ddoSutil.
ddoSutil Examples and Code Snippets
No Code Snippets are available at this moment for ddoSutil.
Community Discussions
No Community Discussions are available at this moment for ddoSutil.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install ddoSutil
Either clone or download as zip from github and extract to desired directory. Set the scripts as executable (e.g: chmod +x ddosutil.sh). In the root of the directory is ddosutil.sh this applies a blanket approach on the system by building a firewall, block lists, TCP stack adjustments, queue changes, connection limiting and so fourth. To use ddosutil.sh simply edit the configuration file ddosutil.conf then run ./ddosutil.sh the results will be output. Also included are 6 utilities, each with a different purpose. Each utility has a configuration file in utils/conf/ or they may be ran supplying -h for help and general usage (e.g. ./ddosutil.geoip.sh -h). Russ Thompson ( Russ -at - vigeek.net).
ddoSutil-geoip.sh Block specific countries completely. Countries can be blocked quickly with just a single command. Many configurable options.
ddoSutil-gpblock.sh Some ddos attacks make GET/PUT requests to invalid URLs. This will… Build block lists based on requests made to apache and actively drop the offending IPs. Configureable, ability to control how many requests per offending IP to resource, allowed.
ddoSutil-nstat.sh Shows information helpful to determine the help type of attack.
ddoSutil-mySQLrecover.pl Some DDOS attacks can overload a database with expensive queries. This tool allows you to actively kill slow expensive queries. Alleviating DB load. Configurable, ability to control after how many seconds should a query be killed.
ddoSutil-harden.sh no longer maintained most replaced and functions improved in ddosutil.sh Implements general sysctl tweaks to help deal with attacks.
ddoSutil-logblockd.pl [In progress] Daemon automatically monitors apache/nginx logs. Actively blocks IP addresses making specific requests (.e.g.: invalid URLs)
ddoSutil-deflated.pl [In progress] Daemon automatically monitors active connections. Actively blocks IP addresses with high connection counts. Actively blocks IP addresses making frequent connections.
ddoSutil-geoip.sh Block specific countries completely. Countries can be blocked quickly with just a single command. Many configurable options.
ddoSutil-gpblock.sh Some ddos attacks make GET/PUT requests to invalid URLs. This will… Build block lists based on requests made to apache and actively drop the offending IPs. Configureable, ability to control how many requests per offending IP to resource, allowed.
ddoSutil-nstat.sh Shows information helpful to determine the help type of attack.
ddoSutil-mySQLrecover.pl Some DDOS attacks can overload a database with expensive queries. This tool allows you to actively kill slow expensive queries. Alleviating DB load. Configurable, ability to control after how many seconds should a query be killed.
ddoSutil-harden.sh no longer maintained most replaced and functions improved in ddosutil.sh Implements general sysctl tweaks to help deal with attacks.
ddoSutil-logblockd.pl [In progress] Daemon automatically monitors apache/nginx logs. Actively blocks IP addresses making specific requests (.e.g.: invalid URLs)
ddoSutil-deflated.pl [In progress] Daemon automatically monitors active connections. Actively blocks IP addresses with high connection counts. Actively blocks IP addresses making frequent connections.
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page