GoldenEye : GoldenEye Layer 7 (KeepAlive+NoCache) DoS Test Tool

GoldenEye is an python app for SECURITY TESTING PURPOSES ONLY!

GoldenEye is a HTTP DoS Test Tool.

Attack Vector exploited: HTTP Keep Alive + NoCache

Utilities

Also Read – Icebox : Virtual Machine Introspection, Tracing & Debugging

Changelog

  • 2016-02-06 Added support for not verifying SSL Certificates
  • 2014-02-20 Added randomly created user agents (still RFC compliant).
  • 2014-02-19 Removed silly referers and user agents. Improved randomness of referers. Added external user-agent list support.
  • 2013-03-26 Changed from threading to multiprocessing. Still has some bugs to resolve like I still don’t know how to propperly shutdown the manager.
  • 2012-12-09 Initial release

To-do

  • Change from getopt to argparse
  • Change from string.format() to printf-like

Usage

USAGE: ./goldeneye.py [OPTIONS]

OPTIONS:
Flag Description Default
-u, –useragents File with user-agents to use (default: randomly generated)
-w, –workers Number of concurrent workers (default: 50)
-s, –sockets Number of concurrent sockets (default: 30)
-m, –method HTTP Method to use ‘get’ or ‘post’ or ‘random’ (default: get)
-d, –debug Enable Debug Mode [more verbose output] (default: False)
-n, –nosslcheck Do not verify SSL Certificate (default: True)
-h, –help Shows this help

Disclaimer

THIS SOFTWARE IS PROVIDED FOR EDUCATIONAL USE ONLY! IF YOU ENGAGE IN ANY ILLEGAL ACTIVITY THE AUTHOR DOES NOT TAKE ANY RESPONSIBILITY FOR IT. BY USING THIS SOFTWARE YOU AGREE WITH THESE TERMS.

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

7 days ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

7 days ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

7 days ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago