Enter the number of requests and the time frame, then press Start. This will simulate an attack or overuse scenario on a web application, which can be mitigated with rate limiting.
Enter the number of requests and the time frame, then press Start. This will simulate an attack or overuse scenario on a web application, which can be mitigated with rate limiting.