⚡ Advanced Multi-Layer Attack Framework

JINKUSU ATTACK

A fully-featured stress testing & penetration recon platform with 90 attack methods across Layer 7 & Layer 4, real IP finder, port scanner, proxy manager, and live traffic analytics.

Launch Console Subscribe Watch Demo ↓
JINKUSU ATTACK — Live Console
0Attack Methods
0Layer 7 Methods
0Layer 4 Methods
0Presets
0K+ Pkt/s Peak
0Recon Tools

Core Capabilities

Everything You Need. One Console.

From raw packet floods to CF bypass, real DNS recon and port scanning — all inside a single browser-based interface.

💣
Layer 7 HTTP Flood
GET, POST, HEAD, PPS, STRESS, BOMB, DYN, DOWNLOADER, SLOW, COOKIE, NULL, EVEN — 13 HTTP flood vectors with configurable burst factors up to ×60.
L7
CloudFlare Bypass
CFB solves the JS challenge. CFBUAM defeats Under Attack Mode. Both use real token generation simulation to evade Cloudflare's 5-second IUAM.
L7 · BYPASS
🛡
Multi-CDN Bypass
Google Project Shield (GSB), DDoS Guard (DGB), Arvan Cloud (AVB) — dedicated bypass vectors for each major CDN provider.
SHIELD BYPASS
Layer 4 TCP/UDP Flood
SYN, TCP, UDP, OVH-UDP, CPS, CONNECTION — raw network floods targeting the transport layer directly, bypassing application-level protections.
L4
📡
Amplification Attacks
MEM (51,000×), NTP, DNS, CHAR, CLDAP, ARD, RDP — 7 reflection/amplification vectors that multiply traffic by exploiting misconfigured servers.
AMPLIFICATION
🎮
Game Protocol Floods
Minecraft (Java + PE), FiveM, TeamSpeak 3, Valve Source Engine, Rust, ArmA — game-specific protocol floods targeting gaming infrastructure.
GAME
🔌
Proxy Manager
Load thousands of HTTP/HTTPS/SOCKS4/SOCKS5 proxies. Auto-validate, rotate round-robin / random / sticky, test liveness. Supports user:pass@host:port auth.
PROXY
🌐
Real IP Finder
DNS-over-HTTPS lookup (Cloudflare DoH), real CF detection via CIDR matching, ipapi.co geolocation, certificate transparency via crt.sh, PTR records.
REAL · RECON
🔎
Port Scanner
Real HTTP fetch probe with AbortController timeouts. 5 preset groups — Web, DB, Game, SSH/FTP, All Common. Detects OPEN / CLOSED / FILTERED / BLOCKED.
REAL · SCAN
📈
Live Traffic Graph
Canvas-based real-time chart displaying packets/sec and error rate across the full attack duration. 60-point rolling window with gradient fill.
ANALYTICS
🧩
Custom HTTP Headers
Inject arbitrary headers into L7 attacks. Quick-add presets: Googlebot UA, XFF spoofing, Cache-Control, Origin spoofing, Accept-Encoding.
L7 · HEADERS
📋
Session History
Last 20 sessions saved to localStorage. Full re-run with one click — restores method, target, threads, duration and profile automatically.
PERSISTENCE
HTTP/2 Rapid Reset
CVE-2023-44487 — most powerful L7 ever documented. HEADERS+RST_STREAM at max rate bypasses all rate limiting. Used to generate 398M req/s attacks against Google.
HTTP2-RESET
🕸
Modern Protocol Floods
WebSocket connection exhaustion, GraphQL introspection bombing, HTTP/2 multiplexing floods, QUIC/HTTP3 UDP-based floods — targeting modern application stacks.
L7 · MODERN
🐢
Advanced Slow Attacks
RUDY (1 byte/sec POST body), Slowloris (half-open connections), DOWNLOADER (slow reads) — exhaust server threads with minimal bandwidth.
SLOW ATTACK
🏭
Enterprise WAF Bypass
Imperva/Incapsula, Sucuri, Qrator, StormWall, Voxility, BlazingFast, G-Core — 7 dedicated bypass methods for the most common enterprise DDoS protection providers.
WAF BYPASS
🏴‍☠️
TCP Flag Floods
FIN, RST, XMAS (all flags) — bypass SYN-based firewalls and stateful packet inspection. RST terminates existing legitimate connections. XMAS evades single-flag pattern matching.
TCP FLAGS
🌐
IoT / WebRTC Amplification
CoAP (IoT devices, ~34×), STUN/WebRTC (~26×), TFTP (~60×), DTLS (~37×) — exploit misconfigured IoT and WebRTC infrastructure as reflectors.
AMPLIFICATION
☠️
DNS Water Torture
Floods authoritative DNS servers with random subdomain queries (rand123.target.com) — exhausts recursive resolver capacity and causes DNS outage for all target subdomains.
DNS ATTACK
🎯
Multi-Attack Orchestrator
Run multiple L7 and L4 methods in parallel against the same scope — combined live stats, staggered ramps, single master stop. Stress layered defenses from one coordinated panel.
MULTI · ORCH
🔐
License + TOTP 2FA
Access gated by rotating 6-digit TOTP plus license key. Per-user storage namespaces isolate methods, presets, proxies, logs, exports, and history — nothing bleeds across accounts on this machine.
ACCESS · SECURITY

Live Simulation

Watch It Work

Real-time attack simulation showing packet throughput, bandwidth estimation, and proxy rotation in action.

attack_console.log
Packets / sec
0
Est. Bandwidth
0 Mbps
Total Packets
0
PKT/S — LIVE GRAPH

Attack Vectors

Layer 7 vs Layer 4

Comprehensive coverage of both application-layer and network-layer attack methods.

💣 Layer 7 — HTTP/S

Application Layer Floods

Target web servers, CDNs and WAFs at HTTP protocol level. Bypass CloudFlare, Google Shield, DDoS Guard, Imperva, Sucuri, Qrator, StormWall and more. Includes HTTP/2 Rapid Reset (CVE-2023-44487), GraphQL bombing, WebSocket exhaustion, DNS Water Torture and cache poisoning.

GETPOSTPPS STRESSBOMBSLOW DOWNLOADERDYNNULL COOKIEEVENHEAD CFBCFBUAMGSB DGBAVBBOT APACHEXMLRPCTOR OVHRHEXSTOMP BYPASSKILLER PURGEHTTP2SOCKET OPTIONSIMPERVASUCURI QRATORSTORMWALLVOXILITY BLAZINGFASTGCORE HTTP2-RESETDNS-WATERGRAPHQL WEBSOCKETRUDYCC SESSIONCACHE-POISON
🧨 Layer 4 — Network

Transport Layer Floods

Raw TCP/UDP/SYN/ACK/FIN/RST/XMAS floods, IP fragmentation, ICMP ping storms, GRE tunnel floods. Amplification: MEM 51K×, NTP, DNS, SNMP 650×, WSD 300×, TFTP 60×, COAP, STUN, DTLS. Game: Minecraft, FiveM, CS:GO, TS3, GMOD, SAMP.

TCPUDPSYN OVH-UDPICMPCPS CONNECTIONMEMNTP DNSCHARCLDAP ARDRDPACK GREQUICSSLFLOOD SSDPWSDSNMP VSETS3FIVEM MINECRAFTMCPEMCBOT GMODCSGOSAMP FINRSTXMAS FRAGMENTCOAPSTUN TFTPDTLS

Intelligence Tools

Real Recon. Real Data.

Not simulated — actual DNS-over-HTTPS queries, certificate transparency lookups and live HTTP port probing.

🌐 IP Finder

Resolve any hostname to its real IPs using Cloudflare DoH. Detects Cloudflare via CIDR matching, fetches ASN/geo from ipapi.co, scans crt.sh for subdomain leaks, and performs PTR/reverse DNS lookups.

DNS RECORDS — example.com
A record 1104.21.45.230
A record 2172.67.182.50
NSns1.cf.net · ns2.cf.net
CDN☁ CLOUDFLARE DETECTED
IP INTELLIGENCE — 104.21.45.230
ASNAS13335 — Cloudflare, Inc.
CountryUnited States (US)

🔎 Port Scanner

Real HTTP fetch probing with AbortController. Fast rejection = CLOSED. Got response = OPEN. Timeout = FILTERED. Browser-blocked ports are detected and marked separately. 4 concurrent probes per batch.

PORT SCAN — 185.199.108.153
80HTTPOPEN47ms
443HTTPSOPEN52ms
8080HTTP-AltCLOSED
3000NodeFILTERED3.5s
8443HTTPS-AltOPEN89ms

Getting Started

How To Use

Four steps from launch to full attack configuration.

01

Select Attack Layer

Choose between 💣 Layer 7 (HTTP/S floods, bypasses, exploits) or 🧨 Layer 4 (TCP/UDP/SYN floods, amplification, game protocols). Or ⚙️ Tools for recon utilities.

Layer: [ L7 ] [ L4 ] [ TOOLS ] → click to switch. Method dropdown auto-updates.
02

Configure Target & Profile

Enter the target URL/IP. For L4 set the port. Use a Quick Preset (⚡) for instant config or manually set method, thread count, duration, and intensity profile.

Target: https://target.com · Threads: 500 · Duration: 120s · Profile: High
03

Load Proxies (Optional)

Paste HTTP/SOCKS4/SOCKS5 proxies into the Proxy Manager. They are auto-validated, shown with ASN info, and rotated round-robin or randomly during the attack.

Format: 1.2.3.4:8080 or user:pass@host:port or socks5://host:port
04

Launch & Monitor

Press ▶ Start Attack (or Space). Watch the live graph, metric counters and log output. When done, an Attack Summary card shows total packets, peak pps, bandwidth and more.

Space = Start/Stop · Esc = Stop · C = Clear logs · = Export report

Subscription Plans

Choose Your Arsenal

Full platform access secured by license key + TOTP. Paid monthly in cryptocurrency. No personal data stored on servers.

STANDARD
$300/month
Base Access
  • Full platform — 90 methods
  • Layer 7 + Layer 4 floods
  • All WAF bypass vectors
  • HTTP2-RESET, GRAPHQL, DNS-WATER
  • Real IP Finder + Port Scanner
  • Multi-Attack (20 simultaneous)
  • Attack Guide + Session History
  • Proxy not included
  • No dedicated proxy pool
Get Base Access →

Ready to Strike?

Launch the console, configure your target, and unleash the full power of JINKUSU ATTACK. For authorized penetration testing only.