![]() If you find bugs or have suggestions about improving the module, don’t hesitate to contact me. add proxy, multiple headers(useragent and other). $ slowloris stop execution: Ctrl + C Install module $ pip install pyslowloris TODO list ![]() Maximum count of created connection (default value 300) - int Also, last but not least reason is to improve my skills in this sphere. The main reason why I’m writing this module it is to create the easy tool for the fast check a small personal or corporate web server what based on Apache and etc. The three application layer attacks are slow loris, slowPost and SIP INVITE. Please DO NOT use this in the real attacks on the servers. The Distributed Denial of Service (DDoS) attack are done indirectly by the. If you are interested what I’m trying doing here, please join my team and let’s do fun together. SL based on keeping alive open connection as long as possible and sending some trash headers to the server. This repository was created for testing Slow Loris vulnerability on different web servers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |