gkbrk / slowloris

Low bandwidth DoS tool. Slowloris rewrite in Python.
MIT License
2.47k stars 690 forks source link
dos dos-attack penetration-testing pentesting slowloris

slowloris.py - Simple slowloris in Python

What is Slowloris?

Slowloris is basically an HTTP Denial of Service attack that affects threaded servers. It works like this:

  1. We start making lots of HTTP requests.
  2. We send headers periodically (every ~15 seconds) to keep the connections open.
  3. We never close the connection unless the server does so. If the server closes a connection, we create a new one keep doing the same thing.

This exhausts the servers thread pool and the server can't reply to other people.

Citation

If you found this work useful, please cite it as

@article{gkbrkslowloris,
  title = "Slowloris",
  author = "Gokberk Yaltirakli",
  journal = "github.com",
  year = "2015",
  url = "https://github.com/gkbrk/slowloris"
}

How to install and run?

You can clone the git repo or install using pip. Here's how you run it.

That's all it takes to install and run slowloris.py.

If you want to clone using git instead of pip, here's how you do it.

SOCKS5 proxy support

However, if you plan on using the -x option in order to use a SOCKS5 proxy for connecting instead of a direct connection over your IP address, you will need to install the PySocks library (or any other implementation of the socks library) as well. PySocks is a fork from SocksiPy by GitHub user @Anorov and can easily be installed by adding PySocks to the pip command above or running it again like so:

You can then use the -x option to activate SOCKS5 support and the --proxy-host and --proxy-port option to specify the SOCKS5 proxy host and its port, if they are different from the standard 127.0.0.1:8080.

Configuration options

It is possible to modify the behaviour of slowloris with command-line arguments. In order to get an up-to-date help document, just run slowloris -h.

License

The code is licensed under the MIT License.