Tool Documentation:

inviteflood Usage Example

Using the eth0 interface (eth0) and the provided user (5000), flood the target domain (example.local) and flood target ( using 100 packets (100):

root@kali:~# inviteflood eth0 5000 example.local 100

inviteflood - Version 2.0
              June 09, 2006

source IPv4 addr:port   =
dest   IPv4 addr:port   =
targeted UA             = [email protected]

Flooding destination with 100 packets
sent: 100

Packages and Binaries:


A tool to perform SIP/SDP INVITE message flooding over UDP/IP. It was tested on a Linux Red Hat Fedora Core 4 platform (Pentium IV, 2.5 GHz), but it is expected this tool will successfully build and execute on a variety of Linux distributions.

Installed size: 33 KB
How to install: sudo apt install inviteflood

  • libc6
  • libnet1
root@kali:~# inviteflood -h

inviteflood - Version 2.0
              June 09, 2006
 Mandatory -
	interface (e.g. eth0)
	target user (e.g. "" or john.doe or 5000 or "1+210-555-1212")
	target domain (e.g. or an IPv4 address)
	IPv4 addr of flood target (ddd.ddd.ddd.ddd)
	flood stage (i.e. number of packets)
 Optional -
	-a flood tool "From:" alias (e.g. jane.doe)
	-i IPv4 source IP address [default is IP address of interface]
	-S srcPort  (0 - 65535) [default is well-known discard port 9]
	-D destPort (0 - 65535) [default is well-known SIP port 5060]
	-l lineString line used by SNOM [default is blank]
	-s sleep time btwn INVITE msgs (usec)
	-h help - print this usage
	-v verbose output mode

Updated on: 2024-Mar-11