Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.

Project Activity

See All Activity >

Categories

Security, Networking

License

GNU General Public License version 2.0 (GPLv2)

Follow multispoof

multispoof Web Site

Other Useful Business Software
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of multispoof!

Additional Project Details

Operating Systems

Linux

Intended Audience

Advanced End Users, Information Technology, System Administrators, Telecommunications Industry

User Interface

Command-line

Programming Language

C, Unix Shell

Related Categories

Unix Shell Security Software, Unix Shell Networking Software, C Security Software, C Networking Software

Registered

2005-07-19