Choose your interface
Miku Miku Beam offers two ways to run attacks:Web interface
Visual monitoring with real-time stats and Miku theme
CLI interface
Fast command-line execution with colored output
Web interface quick start
Open the web interface
Navigate to the web interface in your browser:You’ll see the Miku-themed interface with attack configuration options.
Configure your attack
Set up the attack parameters:
- Target URL:
http://example.com(or your test target) - Attack Method: Choose from:
http_flood- Random HTTP requestshttp_bypass- Browser-mimicking requestshttp_slowloris- Slow connection attackstcp_flood- TCP packet floodingminecraft_ping- Minecraft server pings
- Packet Size:
512bytes (default) - Duration:
60seconds - Packet Delay:
500ms between packets - Threads:
4concurrent threads (0 = auto-detect CPU cores)
Manage proxies and user agents
Click the text button to the right of the beam button to open the editor.Add your proxies and user agents directly in the web interface:Proxies (one per line):User Agents (one per line):
Multiple clients
The web server supports multiple clients running different attacks simultaneously. Each browser tab/window maintains its own isolated attack instance.
- Open additional browser tabs to
http://localhost:3000 - Configure different targets or attack methods
- Each client operates independently
CLI interface quick start
Basic attack syntax
The CLI follows this pattern:Available methods:
http_floodhttp_bypasshttp_slowloristcp_floodminecraft_ping
Customize attack parameters
Use flags to customize the attack:
| Flag | Default | Description |
|---|---|---|
--duration | 60 | Attack duration in seconds |
--delay | 500 | Delay between packets in milliseconds |
--packet-size | 512 | Packet size in bytes |
--threads | 0 | Number of threads (0 = CPU cores) |
--verbose | false | Show detailed attack logs |
--no-proxy | false | Run without proxies |
Use verbose mode
Enable detailed logging to see individual attack attempts:Verbose output includes:
- Proxy addresses used
- Target endpoints
- Individual request details
Example attacks
Understanding the output
CLI output format
- Timestamp (
15:04:05) - Current time - PPS (
245) - Packets per second (rate) - Total (
245) - Total packets sent since start - Proxies (
10) - Number of proxies in rotation
Web interface stats
The web UI displays:- Real-time graph - Visual representation of attack rate
- Packets per second - Current sending rate
- Total packets - Cumulative count
- Success/failure ratio - Attack effectiveness
- Active proxies - Number of proxies in use
Stopping attacks
- Cancel the attack context
- Stop all worker goroutines
- Display final statistics
- Clean up resources
Production deployment
For production use, run the server binary directly:- Frontend and backend run on the same port (
:3000) - Static files are served from
bin/web-client/ - No separate development server needed
Ensure
data/proxies.txt and data/uas.txt exist before starting the server.Next steps
Attack methods
Learn about each attack type in detail
Configuration
Advanced configuration options and tuning
API reference
REST API and Socket.IO documentation
Docker deployment
Run Miku Miku Beam in containers