Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Get Started
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
A syslog message generator that replicates real syslog messages
Using templated message formats with customisable placeholders, run in configurable sequences that can selectively reuse data between steps, must allows more intelligent testing of syslog receivers with realistic data, as well as longer soak testing and stress testing.
must was created to fill a gap found when trying to stress test Splunk as real, indexable and meaningful data was needed.
must will (eventually) be provided as a standalone tool that uses XML configs (for quick use and...
The SAFER Honeypot (Spoofing Active Fingerprints with Enhanced Replies) is a low-interaction virtual honeypot that is compatible with Nmap's second generation OS fingerprint database.
Server/client suite which provides per-user access control/firewall/QOS. Robust and high speed implementation is secure against MAC/IPspoofing, and can scale to large networks with many clients. Options for additional monitoring and captive portal.
Randomized packet generation for source mac, source ipspoofing. Any byte in a packet can be spoofed one by one packet generation. And provide a DDoS testing framework.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
This utility binds IP addresses of your local network according to MAC adresses stored in MySQL database. It can help to avoid IPspoofing, and increase network control.
Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
The goals of the tool are: 1. improve usability for the less technical educated 2. 'anonymous' ( ipspoofing, others? ) 3. Better support for a distributed tracker-like target list ( multi target, multi server ). LOIC-like tool, also in C#