Overview
Themmb attack command launches network stress tests against a specified target using various attack methods. It provides real-time statistics and colored output for monitoring attack progress.
Syntax
Arguments
The attack method to use. Must be one of:
http_flood- Send random HTTP requestshttp_bypass- Send HTTP requests that mimic real browser requests (redirects, cookies, headers, resources)http_slowloris- Send slow HTTP requests and keep connections opentcp_flood- Send random TCP packetsminecraft_ping- Send Minecraft ping/MOTD requests
The target URL or address to attack. Format depends on the attack method:
- HTTP methods:
http://example.comorhttps://example.com - TCP flood:
http://example.comortcp://host:port - Minecraft ping:
minecraft.example.com:25565
Flags
Duration of the attack in seconds. The attack will automatically stop after this time period.
Delay between packets in milliseconds. Lower values increase attack intensity but may cause instability.
Size of each packet in bytes. Larger packets consume more bandwidth per request.
Number of concurrent threads to use. When set to
0 (default), uses the number of CPU cores available on the system.Enable verbose mode to show detailed attack logs, including individual request attempts and proxy usage.
Allow running the attack without proxies. By default, the CLI requires proxies from
data/proxies.txt. Use this flag to bypass that requirement.Path to a custom configuration file (TOML format). If not specified, uses default configuration.
Output
The command displays real-time statistics during the attack:Output Fields
- Timestamp - Current time in HH:MM:SS format
- PPS - Packets per second (current rate)
- Total - Total packets sent since attack started
- Proxies - Number of proxies being used
Verbose Mode Output
With--verbose flag enabled, additional detailed logs are shown:
Examples
Attack Methods
HTTP Flood
Sends rapid random GET/POST HTTP requests to overwhelm the target server.HTTP Bypass
Mimics real browser behavior with realistic headers, cookies, and redirects to bypass basic protections.HTTP Slowloris
Sends slow HTTP requests that keep connections open, exhausting server connection pools.TCP Flood
Sends raw TCP packets with random data at the network layer.Minecraft Ping
Sends Minecraft server status/ping requests to test game server resilience.Configuration
The CLI reads configuration from a TOML file (specified via--config or defaults). The configuration controls:
- Proxies file location - Default:
data/proxies.txt - User agents file location - Default:
data/uas.txt
Proxy File Format
One proxy per line indata/proxies.txt:
protocol://user:password@host:port- Full format with authenticationprotocol://host:port- Without authenticationhost:port- Uses HTTP as default protocolhost- Uses HTTP and port 8080 as defaults
User Agents File Format
One user agent string per line indata/uas.txt:
Stopping an Attack
PressCtrl+C to gracefully stop a running attack:
Error Handling
No Proxies Available
data/proxies.txt or use --no-proxy flag.
Unsupported Attack Method
Invalid Target Format
Performance Tips
Legal and Ethical Use
See Also
- Configuration Reference - Detailed configuration options
- Attack Methods - Deep dive into each attack method
- Web Interface - Using the web-based interface instead of CLI