SlowHTTPTest is a tool that simulates Application Layer Denial of Service attacks by prolonging HTTP connections in different ways. It is highly configurable and can be used to test your web server for DoS vulnerabilities or to determine how many concurrent connections it can handle. SlowHTTPTest works on various platforms such as Linux, macOS, and Cygwin.
SYSTEM REQUIREMENTS
RAM : Minimum 1 GB is required, (4 GB or more is recommended for stability).
Storage : Minimum 100 MB (more storage is required for scans and updates).
OS : Compatible with Linux, macOS, and Windows (via Cygwin or Docker).
Architecture : Supports both 32-bit and 64-bit systems.
Available On : PC
ADDITIONAL INFORMATION
Sergey Shekyan.
2011.
89 KB of binaries
Sergey Shekyan Known for contributions to security tools and DoS testing.
English
2022, Version 1.9.0
Written in C++.
Cross-platform
Open Source under the Apache License 2.0.
SlowHTTPTest is a tool designed to simulate application-layer Denial of Service (DoS) attacks by exploiting HTTP protocol vulnerabilities. Here are some examples of its usage :
$ slowhttptest -c 1000 -H -g -o slowloris -i 10 -r 200 -t GET -u http://example.com
Simulates a Slowloris attack by sending incomplete HTTP headers to the target server (http://example.com)
$ slowhttptest -c 500 -B -g -o slowpost -i 10 -r 100 -t POST -u http://example.com
Simulates a Slow POST attack by sending HTTP POST requests with a very slow data transfer rate.
$ slowhttptest -c 300 -X -g -o slowread -i 10 -r 50 -t GET -u http://example.com
Simulates a Slow Read attack by sending legitimate HTTP requests and reading the server's response very slowly.
$ slowhttptest -c 200 -R -g -o rangeattack -i 10 -r 20 -t GET -u http://example.com
Exploits the Apache Range Header vulnerability to consume server resources.
$ slowhttptest -c 1000 -H -g -o customtest -i 5 -r 300 -t GET -u http://example.com
Adjusts the timeout interval (-i) and connection rate (-r) for a more aggressive test.
$ slowhttptest -c 1000 -H -g -o stats -i 10 -r 200 -t GET -u http://example.com
Generates detailed statistics in HTML and CSV formats for analysis.
$ slowhttptest -c 500 -H -g -o proxytest -i 10 -r 100 -t GET -u http://example.com --proxy http://proxyserver:port
Routes the attack through a specified proxy server.
$ sudo apt-get update
$ sudo apt install slowhttptest
You can install SlowHTTPTest using different package management tools like apt-get, apt, and aptitude :
apt-get :
$ sudo apt-get update
$ sudo apt-get -y install slowhttptest
apt :
$ sudo apt update
$ sudo apt -y install slowhttptest
aptitude (if not installed, install it first) :
$ sudo aptitude update
$ sudo aptitude -y install slowhttptest
Alternatively, you can install SlowHTTPTest manually by downloading the latest tarball, extracting, configuring, compiling, and installing :
$ tar -xzvf slowhttptest-x.x.tar.gz
$ cd slowhttptest-x.x
$ ./configure --prefix=/usr/local
$ make
$ sudo make install
Make sure you have libssl-dev installed before compiling.
gcc, make, and openssl-devel.
$ tar -xzvf slowhttptest-x.x.tar.gz
$ cd slowhttptest-x.x
$ ./configure --prefix=/usr/local
$ make
$ make install
x.x with the version number of the downloaded file.
$ brew update
$ brew install slowhttptest
sudo port install slowhttptest
$ tar -xzvf slowhttptest-x.x.tar.gz
$ cd slowhttptest-x.x
$ ./configure --prefix=/usr/local
$ make
$ sudo make install
x.x with the version number of the downloaded file.
$ sudo apt remove slowhttptest
$ sudo apt autoclean && apt autoremove
sudo apt-get remove slowhttptestsudo apt-get -y autoremove slowhttptestsudo apt-get -y purge slowhttptestsudo apt-get -y autoremove --purge slowhttptestmake uninstall
$ docker rm <container_id>
$ docker rmi slowhttptest:latest
brew uninstall slowhttptestsudo port uninstall slowhttptestmake uninstallCopyright © 2025 HACKERSPOT
All original content, including tools, software, and other information, is protected by copyright and remains the property of its respective owners.
HackerSpot is an informational platform that offers resources such as tools, software, courses, internships, and various other materials aimed at supporting individuals passionate about CyberSecurity and IT.