inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
Features
- Parses Snort rules files to generate false positive attacks
- Support for multiple targets (FQDN, ip addr range, subnet in CIDR format)
- Multi-threaded
- Queue-based
- SOCKS support
License
BSD LicenseFollow inundator
Other Useful Business Software
Find Hidden Risks in Windows Task Scheduler
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of inundator!