inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.

Features

  • Parses Snort rules files to generate false positive attacks
  • Support for multiple targets (FQDN, ip addr range, subnet in CIDR format)
  • Multi-threaded
  • Queue-based
  • SOCKS support

Project Samples

Project Activity

See All Activity >

License

BSD License

Follow inundator

inundator Web Site

Other Useful Business Software
Full-stack observability with actually useful AI | Grafana Cloud Icon
Full-stack observability with actually useful AI | Grafana Cloud

Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of inundator!

Additional Project Details

Operating Systems

BSD, Linux

Languages

English

Intended Audience

Advanced End Users, Information Technology

User Interface

Command-line

Programming Language

Perl

Related Categories

Perl Security Software, Perl Firewall Software, Perl Network Monitoring Software

Registered

2010-07-01