inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.

Features

  • Parses Snort rules files to generate false positive attacks
  • Support for multiple targets (FQDN, ip addr range, subnet in CIDR format)
  • Multi-threaded
  • Queue-based
  • SOCKS support

Project Samples

Project Activity

See All Activity >

License

BSD License

Follow inundator

inundator Web Site

You Might Also Like
Find out just how much your login box can do for your customer | Auth0 Icon
Find out just how much your login box can do for your customer | Auth0

With over 53 social login options, you can fast-track the signup and login experience for users.

From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of inundator!

Additional Project Details

Operating Systems

Linux, BSD

Languages

English

Intended Audience

Information Technology, Advanced End Users

User Interface

Command-line

Programming Language

Perl

Related Categories

Perl Security Software, Perl Firewall Software, Perl Network Monitoring Software

Registered

2010-07-01