My first socks app was an echo client. My next socks app was an IRC bruteforce DoS attacker. My next was a DoS library that I then proceeded to use in all other programs to add hidden DoS functionality.
Anytime you see a linux binary on /prog/, launch it with the --dos=<flood type> --target-host=<target> --target-port=<port> <--source-port=<source port> --source-addr=<source address
>>, and maybe, just
maybe,, it'll bump that host off the net.