Home Pricing Vouches Builder FAQ Methods ToS Get Started
Full Method Reference

Attack Methods

Complete coverage across Layer 4 and Layer 7 — every vector available in one place.

18
Methods
4
Categories
L4
Network
L7
Application
TCP — 5 Methods

Transmission Control Protocol

Connection-based floods targeting TCP handshake and session handling

TCPDROP

TCP proxied socket flood with & without data. Bypasses basic rate limiting through proxy-layer delivery.

SYN

SYN flood with valid randomized options & MPTCP/ECE. Exhausts connection state tables on the target.

OVH

PSH-ACK flood with specialized options. Engineered to bypass OVH anti-DDoS mitigation layers.

TCPTLS

TCP flood with TLS ClientHello handshake payload. Forces TLS handshake processing overhead on the target.

TCPWLA

SYN flood emulating Windows, Linux & Android fingerprints. Bypasses OS fingerprint-based filtering.

UDP — 4 Methods

User Datagram Protocol

Connectionless floods saturating bandwidth and processing pipelines

UDP

Randomized UDP data with small-sized packets. High packet-per-second flood targeting firewall state tables.

UDP-LARGE

Randomized UDP data with large-sized packets. Maximum bandwidth saturation with minimum packet count.

GAME

Multi-protocol game query UDP flood. Targets game server query ports and protocols specifically.

RAKNET

RakNet query flood targeting versions 4.0, 4.081, pre-4.0, 4.082, and newer. Purpose-built for RakNet infrastructure.

Amplification — 4 Methods

Amplification Vectors

Reflection attacks leveraging public infrastructure to multiply attack volume

DNS

DNS Amplification Vector. Exploits open resolvers to achieve up to 50× traffic amplification against the target.

COAP

COAP Amplification Vector. Abuses CoAP protocol reflectors for significant bandwidth multiplication.

STUN

STUN Amplification Vector. Leverages STUN servers to redirect and amplify traffic toward the target.

SSDP

SSDP Amplification Vector. Uses Universal Plug and Play devices as reflectors for amplified UDP floods.

Layer 7 — 5 Methods

Application Layer

HTTP/S floods targeting web infrastructure, CDN bypasses, and browser emulation

HTTP-TOR

HTTP/1.1 flooder made for .onion websites. Routes traffic through the Tor network for anonymous stress testing.

CLOUDFLARE

HTTP flooder with auto-detection for Cloudflare-protected websites. Bypasses CF challenge pages automatically.

HTTP-RPS

High request-per-second HTTP/2 flooder. Maximizes RPS against web servers using multiplexed streams.

HTTP-POWER

HTTP/2 flooder designed for advanced firewalls. Engineered to penetrate enterprise-grade WAF/DDoS protection.

BROWSER

HTTP/2 flood emulating a real Chrome browser. Full TLS fingerprint and header stack to bypass bot detection.

Ready to use these methods?

All 18 methods are available on every plan. Talk to us on Telegram to get started.

Get Started View Pricing