flightsim
Network simulator
A utility to generate malicious network traffic patterns and evaluate security controls.
A utility to safely generate malicious network traffic patterns and evaluate controls.
1k stars
35 watching
136 forks
Language: Go
last commit: 11 months ago
Linked from 3 awesome lists
intrusion-detectionmonitoringsecuritytesting-tools
Related projects:
Repository | Description | Stars |
---|---|---|
| A tool for modeling and generating network traffic from descriptive syntax. | 195 |
| An open-source network security tool designed to detect and prevent hostile reconnaissance attempts by simulating legitimate machines on a network. | 75 |
| An experimentation platform to investigate the interaction of automated agents in abstract simulated network environments. | 1,670 |
| A tool for creating and managing synthetic network hosts to simulate various network conditions and test security systems. | 11 |
| An environment for testing AI agents against a simulated network | 171 |
| A tool that simulates SNMP agents to generate realistic network traffic and test SNMP systems | 395 |
| An emulator application to simulate EMM and ESM procedures for mobile network interactions | 60 |
| A software tool for simulating and analyzing Network-on-Chip architectures in computer networks | 250 |
| A Python-based system for training and testing collision avoidance neural networks using Microsoft AirSim data | 240 |
| A tool for simulating complex network topologies in a controlled environment. | 293 |
| A tool for simulating 5G network interactions between gNodeB and User Equipment (UE) to test network protocols and procedures. | 71 |
| A set of network stack examples in Haskell designed to test and demonstrate various network protocols. | 115 |
| A Rust library for simulating networks to test network-oriented code | 142 |
| A utility to simulate Windows event logs for testing EDR detections and correlation rules | 836 |
| An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,103 |