Documentation Index
Fetch the complete documentation index at: https://mintlify.com/sammwyy/mikuMikuBeam/llms.txt
Use this file to discover all available pages before exploring further.
Available Methods
Miku Miku Beam implements five distinct attack methods, each designed for different use cases and network layers.HTTP Flood
High-volume HTTP requests with GET/POST methods
HTTP Bypass
Browser-mimicking requests to bypass basic protections
Slowloris
Slow header transmission to exhaust server resources
TCP Flood
Raw TCP packet flooding for Layer 4 testing
Minecraft Ping
Minecraft server status request flooding
HTTP Flood
Method ID:http_floodProtocol: HTTP/HTTPS
Supported Proxies: HTTP, HTTPS, SOCKS4, SOCKS5
Implementation
Location:internal/attacks/http/flood.go
Strategy
Sends rapid HTTP requests alternating between GET and POST methods based on packet size:- Small packets (≤512 bytes): 50% GET, 50% POST
- Large packets (>512 bytes): Primarily POST
Request Patterns
GET Requests: Payload appended to URL pathPayload Generation
Random alphanumeric strings using charactersa-zA-Z0-9:
Characteristics
- Timeout: 5 seconds per request
- Redirects: Follows up to 3 redirects
- TLS: Accepts all certificates (
InsecureSkipVerify: true) - Response handling: Body discarded immediately to free resources
HTTP Flood is optimized for maximum request rate. Responses are read and discarded without processing.
HTTP Bypass
Method ID:http_bypassProtocol: HTTP/HTTPS
Supported Proxies: HTTP, HTTPS, SOCKS4, SOCKS5
Implementation
Location:internal/attacks/http/bypass.go
Strategy
Mimics legitimate browser traffic to bypass basic rate limiting and bot detection:- Randomized URL paths with realistic extensions
- Browser-like headers (Accept, Accept-Language, Accept-Encoding)
- Referer headers (same-origin or popular sites)
- Randomized cookies
- 80% GET, 20% POST distribution
Path Randomization
.js, .css, .png, .jpg, .svg, or none
Header Mimicking
Referer Generation
50% same-origin, 50% popular sites:Characteristics
- Timeout: 6 seconds per request
- Redirects: Follows up to 3 redirects
- Query strings: 50% include random cache-busting parameter
- Cookies: 50% include Google Analytics-like cookies
HTTP Bypass sacrifices some speed for stealth, appearing more like legitimate traffic patterns.
HTTP Slowloris
Method ID:http_slowlorisProtocol: HTTP/HTTPS
Supported Proxies: SOCKS4, SOCKS5 only
Implementation
Location:internal/attacks/http/slowloris.go
Strategy
Opens connections and sends HTTP headers slowly, never completing the request. This exhausts server connection pools by holding connections open indefinitely.Attack Flow
- Establish TCP/TLS connection to target
- Send initial request line:
- Dribble headers slowly (one per
PacketDelayinterval): - Never send final
\r\nto complete headers - Keep-alive packets: Send dummy headers periodically
Connection Lifecycle
EachFire() call spawns a goroutine that maintains the connection:
Characteristics
- Connection duration: Indefinite (until attack stops or server closes)
- Resource consumption: Minimal bandwidth, maximum connection slots
- TLS support: Automatically wraps HTTPS targets with TLS
- Header rate: Controlled by
PacketDelayparameter
Slowloris is most effective against servers with low connection limits. Modern servers with proper timeouts may be resistant.
TCP Flood
Method ID:tcp_floodProtocol: TCP (Layer 4)
Supported Proxies: SOCKS4, SOCKS5 only
Implementation
Location:internal/attacks/tcp/flood.go
Strategy
Establishes TCP connections and sends bursts of random binary data, testing network and application layer capacity.Attack Flow
- Parse target as
host:port(no URL scheme) - Establish TCP connection (with optional SOCKS proxy)
- Generate random bytes using
crypto/rand - Send initial burst of
PacketSizebytes (default 512) - Send additional bursts (1-3 random count)
- Close connection
Characteristics
- Write deadline: 2 seconds
- Payload: Cryptographically random bytes
- Burst count: 1-4 total writes per connection
- Connection lifecycle: Short-lived, closed after bursts
TCP Flood targets Layer 4. Use this for testing network infrastructure, firewalls, and TCP-based services.
Minecraft Ping
Method ID:minecraft_pingProtocol: Minecraft Server List Ping (TCP)
Supported Proxies: SOCKS4, SOCKS5 only
Implementation
Location:internal/attacks/game/minecraft_ping.go
Strategy
Sends legitimate Minecraft server status requests following the Server List Ping protocol. This tests Minecraft server capacity to handle status queries.Protocol Implementation
Follows Minecraft protocol specification (protocol version 754): 1. Handshake Packet (0x00):Packet Construction
VarInt Encoding
Minecraft uses variable-length integer encoding:Port Defaulting
Automatically uses Minecraft’s default port:Characteristics
- Connection timeout: 3 seconds
- Response handling: Reads and discards 256 bytes + 64 bytes
- Protocol compliance: Fully compliant with Minecraft Server List Ping
- Target format:
hostname:portor justhostname(uses 25565)
This attack is specific to Minecraft servers and won’t affect non-Minecraft services, even if they listen on port 25565.
Proxy Compatibility Matrix
| Method | HTTP/HTTPS Proxy | SOCKS4/5 Proxy |
|---|---|---|
| HTTP Flood | ✅ | ✅ |
| HTTP Bypass | ✅ | ✅ |
| HTTP Slowloris | ❌ | ✅ |
| TCP Flood | ❌ | ✅ |
| Minecraft Ping | ❌ | ✅ |
Method Selection Guide
Use HTTP Flood when:
- Maximum request rate is the priority
- Testing raw HTTP server capacity
- Target has no bot protection
Use HTTP Bypass when:
- Target has basic rate limiting or bot detection
- Need to blend in with legitimate traffic
- Testing WAF or security rules
Use Slowloris when:
- Testing connection pool limits
- Target has limited concurrent connection capacity
- Low bandwidth but high impact needed
Use TCP Flood when:
- Testing Layer 4 infrastructure
- Target is a TCP service (not HTTP)
- Firewall or DDoS protection testing
Use Minecraft Ping when:
- Target is a Minecraft server
- Testing query handling capacity
- Legitimate protocol compliance required