GoldenEye : GoldenEye Layer 7 (KeepAlive+NoCache) DoS Test Tool

GoldenEye is an python app for SECURITY TESTING PURPOSES ONLY!

GoldenEye is a HTTP DoS Test Tool.

Attack Vector exploited: HTTP Keep Alive + NoCache

Utilities

Also Read – Icebox : Virtual Machine Introspection, Tracing & Debugging

Changelog

  • 2016-02-06 Added support for not verifying SSL Certificates
  • 2014-02-20 Added randomly created user agents (still RFC compliant).
  • 2014-02-19 Removed silly referers and user agents. Improved randomness of referers. Added external user-agent list support.
  • 2013-03-26 Changed from threading to multiprocessing. Still has some bugs to resolve like I still don’t know how to propperly shutdown the manager.
  • 2012-12-09 Initial release

To-do

  • Change from getopt to argparse
  • Change from string.format() to printf-like

Usage

USAGE: ./goldeneye.py [OPTIONS]

OPTIONS:
Flag Description Default
-u, –useragents File with user-agents to use (default: randomly generated)
-w, –workers Number of concurrent workers (default: 50)
-s, –sockets Number of concurrent sockets (default: 30)
-m, –method HTTP Method to use ‘get’ or ‘post’ or ‘random’ (default: get)
-d, –debug Enable Debug Mode [more verbose output] (default: False)
-n, –nosslcheck Do not verify SSL Certificate (default: True)
-h, –help Shows this help

Disclaimer

THIS SOFTWARE IS PROVIDED FOR EDUCATIONAL USE ONLY! IF YOU ENGAGE IN ANY ILLEGAL ACTIVITY THE AUTHOR DOES NOT TAKE ANY RESPONSIBILITY FOR IT. BY USING THIS SOFTWARE YOU AGREE WITH THESE TERMS.

R K

Recent Posts

How OpenClaw Works

Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…

5 days ago

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

7 days ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

7 days ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

1 week ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

1 week ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

3 months ago