INUNDATOR

IDS

Inundator is a multi-threaded, queue-driven, IDS evasion tool. Its purpose is to anonymously flood intrusion detection systems (specifically Snort) with traffic designed to trigger false positives via a SOCKS proxy in order to obfuscate a real attack.

Inundator would be used whenever you feel there is a significant chance the attack you’re about to perform may be detected by the target’s intrusion detection system. You would launch inundator prior to starting the attack, and continue running it well after you have finished the attack. The hope is that if your attack is detected by the IDS, the alert will be buried among several thousand false positives, thus minimizing the chance of an IDS analyst detecting the real attack.

inundator is full featured, multi-threaded, queue-based, supports multiple targets, and requires the use of a SOCKS proxy for anonymization. Via Tor, inundator is capable of generating around 1000 false positives per minute. Via a high-bandwidth SOCKS proxy, you might be able to generate ten times that amount.


DOWNLOADS

No Official Website

SYSTEM REQUIREMENTS

RAM : Minimum 500 mb

Storage : Minimum 300 mb of Device storage.

OS : Primarily Linux and BSD

Architecture : Supports standard architectures compatible with Linux/BSD systems.

Available On : PC


ADDITIONAL INFORMATION

Published By

Associated with contributors like "epixoip" and "itsthel10n"

Release Date

Registered on July 1, 2010

Approximate Size

300 mb

Publisher Info

Epixoip and itsthel10n are developers of Inundator

Supported Languages

English

Last Update

April 10, 2013

Programming Language

Written in Perl

Operating System

Designed for Linux and BSD

License

BSD License

  • Parses Snort rules files to generate false positive attacks
  • Support for multiple targets (FQDN, ip addr range, subnet in CIDR format)
  • Multi-threaded
  • Queue-based
  • SOCKS support

  • Multi-threaded & Queue-driven : Uses multiple threads to generate a high volume of false alerts.
  • SOCKS Proxy Support : Ensures anonymity while sending traffic.
  • False Positive Generation : Parses Snort rules to craft harmless packets that mimic real attacks.
  • Overwhelming IDS Logs : Generates thousands of false positives per minute to bury real attack alerts.

  • Flood Control & Water Management : An inundator could be a device or system designed to release large amounts of water to control flooding or irrigation.
  • Emergency Response : In disaster scenarios, an inundator might be used to simulate flooding for training purposes.
  • Metaphorical Use : Inundator can describe anything that overwhelms—like an inundator of information, meaning an excessive amount of data.
  • Firefighting : Some firefighting systems use inundation techniques to flood areas with water or fire-retardant substances.

The Inundator tool is primarily used for HTTP flood testing and IDS evasion. Here are some usage examples :

Basic Usage
  1. Flood Testing : inundator -n 1000000 -c 1000 -H "Connection: keep-alive" http://localhost/path
  2. This sends 1 million requests to a localhost web server with 1000 concurrent connections and a custom header.

  3. Adding HTTP Headers : inundator -H "User-Agent: Mozilla/5.0" http://example.com
  4. This adds a custom User-Agent header to the requests.

  5. Concurrency Control : inundator -c 500 http://example.com
  6. This sets the number of concurrent connections to 500.

  7. Help Command : inundator --help
  8. Displays all available options and usage instructions.

  • Performance Testing : Evaluate the maximum throughput a server can handle.
  • Security Testing : Simulate HTTP flood attacks to test the resilience of intrusion detection systems.

  • Nmap
  • Perl (>= 5.10)
  • Net::SOCKS (>=0.03)
  • Net::CIDR (>= 0.11)
  • Snort’s rules files
  • Oinkmaster (for keeping Snort rules up to date)
  • Tor (If you don’t have a remote SOCKS proxy to exploit.)

Terminal Installation Commands ...

$ sudo apt-get update

$ sudo git clone https://github.com/opsengine/inundator.git


GUI Installation Steps ...
Linux
  1. Download the Inundator package from SourceForge.
  2. Extract the package using : tar -xvf inundator.tar.gz
  3. Navigate to the extracted directory : cd inundator
  4. Install dependencies (if required) : sudo apt-get install perl
  5. Run the tool : ./inundator.pl
Windows
  1. Download the Windows version from SourceForge.
  2. Extract the files and navigate to the folder.
  3. Run the tool using : perl inundator.pl
  4. (Ensure Perl is installed on your system.)

MacOS
  1. Download the package from SourceForge.
  2. Install dependencies : brew install perl
  3. Extract and run :

    $ tar -xvf inundator.tar.gz

    $ cd inundator

    $ perl inundator.pl

Terminal Uninstallation Commands ...

$ sudo apt-get remove inundator

$ sudo apt autoclean && apt autoremove


GUI Uninstallation Steps ...
Linux
  1. Remove the directory : rm -rf inundator
  2. If installed via a package manager, use : sudo apt-get remove inundator
Windows
  1. Open Command Prompt as Administrator.
  2. Run : wmic product where name="Inundator" call uninstall
MacOS
  1. Remove the directory : rm -rf inundator
  2. Uninstall Perl (if needed) : brew uninstall perl

Copyright © 2025 HACKERSPOT

All original content, including tools, software, and other information, is protected by copyright and remains the property of its respective owners.

Subscribe for more Information
HACKERSPOT

HackerSpot is an informational platform that offers resources such as tools, software, courses, internships, and various other materials aimed at supporting individuals passionate about CyberSecurity and IT.

Contacts

Bapatla, Andhrapradesh, India 237101

bablunannam@gmail.com

+91 7995819235