Add Max Packet Limit and Graceful Termination for DoS Tool #1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary:
This pull request adds the ability to limit the number of packets sent during a DoS attack and gracefully terminates the program when the specified packet limit is reached or when the user interrupts with
Ctrl+C
.Key Changes:
max_packets
option that allows the user to specify the maximum number of packets to send.attack
function to check for the packet count limit and stop the attack once the limit is reached.stop_event
flag. This ensures that all threads stop correctly, either when the maximum packet count is reached or when the user interrupts the process.Reason for Change:
The original version of the tool lacked the ability to limit the number of packets sent, which could lead to unwanted continuous attacks. This feature is crucial for better control and responsible use of the tool, as well as ensuring that the program terminates gracefully in multi-threaded environments.
Please review the changes, and feel free to suggest any improvements. Thank you!