inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
Features
- Parses Snort rules files to generate false positive attacks
- Support for multiple targets (FQDN, ip addr range, subnet in CIDR format)
- Multi-threaded
- Queue-based
- SOCKS support
License
BSD LicenseFollow inundator
You Might Also Like
One Platform. Total IT Insight. Start with PRTG Now
Why settle for fragmented monitoring? PRTG consolidates everything - servers, VMs, network devices, cloud services, and more, into one powerful platform. Get real-time status, customizable alerts, and deep analytics to drive smarter decisions. Designed for complex environments, PRTG scales with your needs, supports team collaboration, and helps you prevent outages before they impact users. Take control of your IT landscape and deliver the uptime your business requires.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of inundator!