Note: This version has been modified from the original that can be found here
Notable changes:
Added tor flag to use tor socks proxy
Set maxConnections flag to set maximum number of simultaneous connections
recommended to set maxConnections flag to <= ulimit -n
Original Readme below:
FAQ
Features
Uses as low network bandwidth as possible.
Low CPU and memory usage.
Automatically and silently eats all the available TCP connections
to the server.
Supports https.
Easily hackable thanks to clear and concise Go syntax
and powerful Golang features.
Limitations
Can eat up to 64K TCP connections from a single IP due to TCP limitations.
Just use proxies if you want overcoming this limitation :)
How it works?
It tries occupying and keeping busy as much tcp connections
to the victim as possible by using as low network bandwidth as possible.
If goloris is lucky enough, then eventually it should eat all the available
connections to the victim, so no other client could connect to it.
See the source code for more insights.
How quickly it can take down unprotected nginx with default settings?
In a few minutes with default config options.
Which versions of nginx are vulnerable?
All up to 1.5.9 if unprotected as described below (i.e. with default config).
The original source code is available at http://github.com/valyala/goloris.
This version has been modified to support TOR proxy and indefinite attacking