Other techniquesOther techniquesStress/load testingJMeter for many protocols and servicesk6 for KubernetesWeb dynamic analysisOWASP's Zed Proxy Attack