high fidelity threat intelligence generator (heehee)
Go to file
2024-09-05 23:00:08 -05:00
go.mod performance improvement, cleanup 2024-09-05 23:00:08 -05:00
go.sum performance improvement, cleanup 2024-09-05 23:00:08 -05:00
main.go performance improvement, cleanup 2024-09-05 23:00:08 -05:00
README.md performance improvement, cleanup 2024-09-05 23:00:08 -05:00

gaynoise

unleashes a storm of legitimate-looking fugazi traffic in order to congest, invalidate, and annoy threat intelligence sensors such as GreyNoise and SpamHaus.

          got some intelligence for u
                  right here
          _                         _
         |_|                       |_|
         | |         /^^^\         | |
        _| |_      (| "o" |)      _| |_
      _| | | | _    (_---_)    _ | | | |_
     | | | | |' |    _| |_    | '| | | | |
     |          |   /     \   |          |
      \        /  / /(. .)\ \  \        /
        \    /  / /  | . |  \ \  \    /
          \  \/ /    ||Y||    \ \/  /
           \__/      || ||      \__/
                     () ()
                     || ||
                    ooO Ooo

inspired by blackout's MagicPacketGenerator, gaynoise was tailored to further infuriate whitey with improvements including

  • operating system header spoofing (linux, windows, cisco ios, solaris, etc) to legitimize traffic
  • targeted destination ip address generation
  • rfc1918 awareness
  • improved performance

with enough instances running, gaynoise could render many categories of threat intelligence sensors' data aggregations useless

usage

grab a binary for your architecture from Releases

everyone everywhere:

./gaynoise

targeted list of cidr's (individual ip's are /32's):

./gaynoise -l nerds.txt

need help?

./gaynoise -h

    (-r) - cidr range [0.0.0.0/0]
    (-l) - target cidr list
    (-c) - concurrent threads [100]
    (-t) - duration [-1]
    (-p) - usec delay between sends [0]