With the greatest respect, if you have had to come on here to ask what kind of application you would use to do this, then I would assume that you are a novice. If you launch these kind of attacks without knowing what you are doing (ie how to manipulate IP traffic and hide your tracks etc), then you are likely to cause a great deal of trouble and you will probably end up with your ISP account being disabled and possibly blacklisted. Is it worth it?
look up ghostmail, then get this http://www.secure-proxy.com/ IP masquerading and ssl the easy way.
I will not condone or advise what you are thinking or going to do, but here are some tools to do it.
When I had a company "steal" £40 from me for products they refused to supply and would not refund as they were based in Germany, I made sure no one else could be scammed or contact them for a "long" period of time.
I cannot see how this is illegal, if the internet is not policed in this way it cannot be policed in people protecting themselves or protecting others. And "spammers" espicially **** ones deserve everything they get.
I did to an old friend of mine using a cron job on my unix machine.
The only problem with mailbombing someone is they just set up a rule to automatically return your mail so you end up with it an dthey are not adversely effected so mail bombing is a waste of time unless the recipient is a techno muppet and doesn't know how to setup a rule.
yes but it gets to a point where they cant do anything as there email gateway is overloaded with incoming mail and in most cases their email server or client cant do a thing let alone process a rule and send it back to a dummy address (ghostmail).
BT now limit one of my accounts to sending 500 emails a minute. because of the said incident. but its only on one of their smtp servers. nd I have acounts with about 6 isp's as well as direct access to a backbone access netowrk through work. 600mb STM4 anybody !!!.