inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.


  • Parses Snort rules files to generate false positive attacks
  • Support for multiple targets (FQDN, ip addr range, subnet in CIDR format)
  • Multi-threaded
  • Queue-based
  • SOCKS support

Project Samples

Project Activity

See All Activity >


BSD License

Follow inundator

inundator Web Site

Other Useful Business Software

Searching for Affordable Business Phone Service? Searching for Affordable Business Phone Service? Icon
Searching for Affordable Business Phone Service? Icon

If you're on the hunt for business phone service that is reliable and budget-friendly, Voice over Internet Protocol (VoIP) is your answer.

Today's small-to-medium-sized (SMB) businesses and large enterprises are saving on their monthly communications costs by making one simple decision: to switch to a VoIP service solution from their old, outdated Plain Old Telephone Service (POTS). By choosing a new VoIP service, these companies enjoy the flexibility, reliability, call features, and audio quality that only a VoIP service can provide. Plus, they cut their phone bill by up to 70%!

Rate This Project

Login To Rate This Project

User Reviews

Be the first to post a review of inundator!

Additional Project Details



Intended Audience

Advanced End Users, Information Technology

User Interface


Programming Language