PoC of five Slow Rate HTTP/2 DoS attacks seen in the following research paper:
The tool measures the connection waiting time at the web server for the specified attack payload.
You will need Python3 with the Hyper-h2 dependency:
apt install python3 python3-pip
pip3 install h2
$ ./slowh2attacks.py -h
usage: slowh2attacks.py [-h] {1,2,3,4,5} target port
positional arguments:
{1,2,3,4,5} specify the attack number
target specify the hostname or IP of the target
port target port
Instructions to capture the decrypted traffic can be found here.