inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.

Features

  • Parses Snort rules files to generate false positive attacks
  • Support for multiple targets (FQDN, ip addr range, subnet in CIDR format)
  • Multi-threaded
  • Queue-based
  • SOCKS support

Project Samples

Project Activity

See All Activity >

License

BSD License

Follow inundator

inundator Web Site

Other Useful Business Software
Auth0 for AI Agents now in GA Icon
Auth0 for AI Agents now in GA

Ready to implement AI with confidence (without sacrificing security)?

Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
Start building today
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of inundator!

Additional Project Details

Operating Systems

BSD, Linux

Languages

English

Intended Audience

Advanced End Users, Information Technology

User Interface

Command-line

Programming Language

Perl

Related Categories

Perl Security Software, Perl Firewall Software, Perl Network Monitoring Software

Registered

2010-07-01