inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.

Features

  • Parses Snort rules files to generate false positive attacks
  • Support for multiple targets (FQDN, ip addr range, subnet in CIDR format)
  • Multi-threaded
  • Queue-based
  • SOCKS support

Project Samples

Project Activity

See All Activity >

License

BSD License

Follow inundator

inundator Web Site

Other Useful Business Software
Build AI Apps with Gemini 3 on Vertex AI Icon
Build AI Apps with Gemini 3 on Vertex AI

Access Google’s most capable multimodal models. Train, test, and deploy AI with 200+ foundation models on one platform.

Vertex AI gives developers access to Gemini 3—Google’s most advanced reasoning and coding model—plus 200+ foundation models including Claude, Llama, and Gemma. Build generative AI apps with Vertex AI Studio, customize with fine-tuning, and deploy to production with enterprise-grade MLOps. New customers get $300 in free credits.
Try Vertex AI Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of inundator!

Additional Project Details

Operating Systems

BSD, Linux

Languages

English

Intended Audience

Advanced End Users, Information Technology

User Interface

Command-line

Programming Language

Perl

Related Categories

Perl Security Software, Perl Firewall Software, Perl Network Monitoring Software

Registered

2010-07-01