gliror

Crates.iogliror
lib.rsgliror
version1.1.0
created_at2025-11-06 10:42:56.238638+00
updated_at2025-11-14 02:45:41.453245+00
descriptionAdvanced Rust-based DoS/Load Testing Tool with Concurrent Requests
homepagehttps://github.com/KillDarkness/Gliror
repositoryhttps://github.com/KillDarkness/Gliror
max_upload_size
id1919416
size234,391
KillDarkness (KillDarkness)

documentation

https://github.com/KillDarkness/Gliror/blob/main/docs/index.md

README

GLIROR Banner

GLIROR

An advanced, multi-vector (HTTP, UDP, Slowloris) DoS and Load Testing tool with cluster support, written in Rust.

Crates.io Documentation License

GLIROR is a high-performance Denial of Service and load testing tool designed for security professionals and developers. It supports multiple attack vectors, real-time performance monitoring, and can be run in a distributed cluster for large-scale tests.

Features

  • Multiple Attack Vectors: Supports HTTP/S flooding, UDP flooding, and Slowloris attacks.
  • Cluster Mode: Distribute load across multiple worker nodes, controlled by a central master.
  • YAML Configuration: Define and manage complex attack profiles using simple YAML files.
  • Real-time Monitoring: Colorful, real-time status display of key metrics like RPS, success/error rates, and average response time.
  • Advanced HTTP Control: Customize HTTP method, headers, and request payloads.
  • Network Flexibility: Route traffic through HTTP/S proxies.
  • Rate & Duration Control: Fine-tune concurrency, delay, and attack duration.
  • Multi-format Output: Save comprehensive test results to files in JSON, XML, YAML, CSV, or TOML formats for analysis.

Installation

Ensure you have the Rust toolchain installed. Then, install GLIROR from Crates.io:

cargo install gliror

Quick Start

Example 1: Simple HTTP Flood

gliror --url http://example.com --time 60 --concurrent 100

Example 2: UDP Flood

gliror --attack-type udp --host 1.1.1.1 --target-port 53 --time 60

Example 3: Using a Configuration File

Create a file named attack.yml:

url: "http://example.com"
attack_type: "http"
time: 120
concurrent: 200
headers:
  X-Custom-Header: "gliror-test"

Run the attack:

gliror --config attack.yml

Example 4: Configuration File with Cluster Distribution Mode

Create a file named cluster_attack.yml:

url: "http://example.com"
attack_type: "http"
time: 120
concurrent: 200
cluster_mode: true
role: "master"
distribution_mode: "max-power"  # Options: "even" (default), "max-power"
total_workers: 2
port: 8080
output: "results.json"  # Output file for worker results

Run the master node:

gliror --config cluster_attack.yml --role master

Example 5: Cluster Mode with Max Power Distribution

Run the master node with max power distribution mode:

gliror --cluster-mode --role master --distribution-mode max-power --url http://example.com --time 60 --concurrent 1000

Run worker nodes:

gliror --cluster-mode --role worker --coordinator-addr http://MASTER_IP:8080

This will distribute the full concurrent load to each worker, allowing for maximum request throughput across the cluster.

Documentation

For detailed information, please refer to the documentation in the docs/ directory.

  1. Overview
  2. Installation
  3. Usage
  4. Configuration File
  5. Features
  6. Advanced Usage
  7. Cluster Mode
  8. Troubleshooting
  9. Performance Tips
  10. Legal Notice
  11. FAQ

Legal Disclaimer

This tool is intended for educational purposes and authorized security testing only. Misuse of this tool against systems without explicit permission is illegal. The developers assume no liability and are not responsible for any misuse or damage caused by this program.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Commit count: 0

cargo fmt