{"id":647,"date":"2018-12-14T08:14:45","date_gmt":"2018-12-14T07:14:45","guid":{"rendered":"https:\/\/nil.uniza.sk\/traffic-generators-list\/"},"modified":"2019-02-15T18:25:52","modified_gmt":"2019-02-15T17:25:52","slug":"traffic-generators-list","status":"publish","type":"post","link":"https:\/\/nil.uniza.sk\/en\/traffic-generators-list\/","title":{"rendered":"Traffic generators &#8211; the list"},"content":{"rendered":"<p>The page provides summarized view of available traffic generators.<br \/>\nA <a href=\"#B\">B<\/a>\u00a0<a href=\"#C\">C<\/a>\u00a0<a href=\"#D\">D<\/a> <a href=\"#E\">E<\/a> F G H <a href=\"#I\">I<\/a> J <a href=\"#K\">K<\/a> <a href=\"#L\">L<\/a>\u00a0<a href=\"#M\">M<\/a>\u00a0<a href=\"#N\">N<\/a>\u00a0<a href=\"#O\">O<\/a>\u00a0<a href=\"#P\">P<\/a>\u00a0<a href=\"#I\">R<\/a>\u00a0<a href=\"#S\">S<\/a> <a href=\"#T\">T<\/a> <a href=\"#U\">U<\/a> V <a href=\"#W\">W<\/a> X Y\u00a0<a href=\"#Z\">Z<\/a><\/p>\n<h1><a name=\"B\"><\/a>B<\/h1>\n<h2 class=\"TitleHeading\">Bit-Twist<\/h2>\n<p><strong>web<\/strong>:\u00a0<a href=\"https:\/\/sourceforge.net\/projects\/bittwist\/files\/\">https:\/\/sourceforge.net\/projects\/bittwist\/files\/<\/a><\/p>\n<p><strong>Description:<\/strong> D-ITG (Distributed Internet Traffic Generator) is a platform capable to produce traffic at packet level accurately replicating appropriate stochastic processes for both IDT (Inter Departure Time) and PS (Packet Size) random variables (exponential, uniform, cauchy, normal, pareto, &#8230;).<\/p>\n<p>D-ITG supports both IPv4 and IPv6 traffic generation and it is capable to generate traffic at network, transport, and application layer..<\/p>\n<p><strong>Licence:<\/strong> BSD Licence<\/p>\n<p><strong>Platform:<\/strong>\u00a0Mac, Win, Linux BSD<\/p>\n<p><strong>GUI\/CLI:<\/strong> -\/Yes<\/p>\n<p><strong>Protocols:\u00a0<\/strong>ARP, IP, ICMP,\u00a0TCP, UDP<\/p>\n<p><strong>Packet size:<\/strong> constant<\/p>\n<p><strong>Interpacket delay<\/strong>: constant,<\/p>\n<p><strong>Header programability<\/strong>: Yes<\/p>\n<p><strong>QoS tagging:<\/strong>\u00a0Yes<\/p>\n<p><strong>Logging, reports:<\/strong> No<\/p>\n<p><strong>Send pcap<\/strong>: Yes<\/p>\n<h2>Brute<\/h2>\n<p><strong>web:\u00a0\u00a0<\/strong><a href=\"https:\/\/github.com\/awgn\/brute\">https:\/\/github.com\/awgn\/brute<\/a><\/p>\n<p><strong>Description: <\/strong>BRUTE is the acronym of Brawny and RobUstT Traffic Engine. It is a user space application running on the top Linux operating system designed to produce high load of customizable network traffic. The design of the software has been driven to achieve high precision and performance in the traffic generation. Currently Brute has been tested on AI32 Intel Pentium, PA-RISC 2.0 (PA8500) and AMD64 Athlon architectures, over both fast and gigabit ethernet.<\/p>\n<p><strong>Licence: <\/strong>open-source<\/p>\n<p><strong>Platform: <\/strong>Linux<\/p>\n<p><strong>GUI\/CLI: <\/strong>-\/Yes<\/p>\n<p><strong>Protocols:<\/strong> IPv4\/IPv6<\/p>\n<p><strong>Packet size: <\/strong>constant, exponential\/poisson,<\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:\u00a0<\/strong><\/p>\n<p><strong>Logging, reports: <\/strong>partial<\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h1><a name=\"C\"><\/a>C<\/h1>\n<h2>Colasoft Packet Builder<\/h2>\n<p><strong>web:\u00a0\u00a0<\/strong><a href=\"https:\/\/www.colasoft.com\/download\/products\/download_packet_builder.php\">https:\/\/www.colasoft.com\/download\/products\/download_packet_builder.php<\/a><\/p>\n<p><strong>Description:\u00a0\u00a0<\/strong>Colasoft Packet Builder enables creating custom network packets; users can use this tool to check their network protection against attacks and intruders.Colasoft Packet Builder includes a very powerful editing feature. Besides common HEX editing raw data, it features a Decoding Editor allowing users to edit specific protocol field values much easier<\/p>\n<p><strong>Licence: <\/strong>freeware<\/p>\n<p><strong>Platform:<\/strong>Windows 2000\/XP\/2003\/Vista\/7\/8\/10<\/p>\n<p><strong>GUI\/CLI:\u00a0\u00a0<\/strong>Yes\/-<\/p>\n<p><strong>Protocols:<\/strong><\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:\u00a0<\/strong><\/p>\n<p><strong>Logging, reports:\u00a0<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h1><a name=\"D\"><\/a>D<\/h1>\n<h2 class=\"TitleHeading\">D-ITG &#8211; Distributed Internet Traffic Generator<\/h2>\n<p><strong>web<\/strong>: <a href=\"http:\/\/www.grid.unina.it\/software\/ITG\/\">http:\/\/www.grid.unina.it\/software\/ITG\/<\/a><\/p>\n<p><strong>Description:<\/strong> D-ITG (Distributed Internet Traffic Generator) is a platform capable to produce traffic at packet level accurately replicating appropriate stochastic processes for both IDT (Inter Departure Time) and PS (Packet Size) random variables (exponential, uniform, cauchy, normal, pareto, &#8230;).<\/p>\n<p>D-ITG supports both IPv4 and IPv6 traffic generation and it is capable to generate traffic at network, transport, and application layer..<\/p>\n<p><strong>Licence:<\/strong> BSD Licence<\/p>\n<p><strong>Platform:<\/strong>\u00a0Linux (Ubuntu, Debian, Fedora, CentOS, OpenWRT), Windows (XP, Vista, 7), OSX (Leopard), FreeBSD<\/p>\n<p><strong>GUI\/CLI:<\/strong> Yes\/Yes<\/p>\n<p><strong>Protocols:<\/strong> TCP, UDP, ICMP, DCCP, SCTP, Telnet, DNS, VOIP (codec &#8211; G.711, G.723, G.729)<\/p>\n<p><strong>Packet size:<\/strong> Equal, Exponential, Paret, Cauchy, Normal, Poisson and Gamma<\/p>\n<p><strong>Interpacket delay<\/strong>:\u00a0Equal, Exponential, Paret, Cauchy, Normal, Poisson and Gamma<\/p>\n<p><strong>Header programability<\/strong>: Partially<\/p>\n<p><strong>QoS tagging:<\/strong>\u00a0Yes<\/p>\n<p><strong>Logging, reports:<\/strong> Yes<\/p>\n<p><strong>Send pcap<\/strong>: No<\/p>\n<h1><a name=\"E\"><\/a>E<\/h1>\n<h2>EPB &#8211;\u00a0Ethernet Packet Bombardier<\/h2>\n<p><strong>web:\u00a0\u00a0<\/strong><a href=\"http:\/\/m-a-z.github.io\/epb\/\">http:\/\/m-a-z.github.io\/epb\/<\/a>\u00a0 \u00a0 <a href=\"http:\/\/maz-programmersdiary.blogspot.com\/2012\/05\/epb-ethernet-package-bombardier.html\">\u00a0http:\/\/maz-programmersdiary.blogspot.com\/2012\/05\/epb-ethernet-package-bombardier.html<\/a><\/p>\n<p><strong>Description:<\/strong>Epb is a tool allowing one to send customized ethernet packets. There is no GUI, but also not many libraries needed. Furthermore epb is light and reliable. Also understanding what code does is easy.<\/p>\n<p><strong>Licence: <\/strong>open-source ?<\/p>\n<p><strong>Platform: <\/strong>Linux<\/p>\n<p><strong>GUI\/CLI: <\/strong>-\/Yes<\/p>\n<p><strong>Protocols:<\/strong> IPv4<\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:\u00a0<\/strong><\/p>\n<p><strong>Logging, reports:\u00a0<\/strong><\/p>\n<p><strong>Send pcap<\/strong>: Yes<\/p>\n<h1><a name=\"#H\"><\/a>H<\/h1>\n<h2>Hping<\/h2>\n<h1><a name=\"I\"><\/a>I<\/h1>\n<h2 class=\"TitleHeading\">Iperf<\/h2>\n<p><strong>web<\/strong>: <a href=\"https:\/\/iperf.fr\/\">https:\/\/iperf.fr\/<\/a><\/p>\n<p><strong>Description:<\/strong>i Perf3 is a tool for active measurements of the maximum achievable bandwidth on IP networks. It supports tuning of various parameters related to timing, buffers and protocols (TCP, UDP, SCTP with IPv4 and IPv6). For each test it reports the bandwidth, loss, and other parameters. This is a new implementation that shares no code with the original iPerf and also is not backwards compatible. iPerf was orginally developed by NLANR\/DAST. iPerf3 is principally developed by ESnet \/ Lawrence Berkeley National Laboratory..<\/p>\n<p><strong>Licence: <\/strong>BSD Licence<\/p>\n<p><strong>Platform:<\/strong>\u00a0Win32, BSD, Linux, Mac<\/p>\n<p><strong>GUI\/CLI: <\/strong>&#8211; \/Yes<\/p>\n<p><strong>Protocols:\u00a0<\/strong>UDP, TCP, SCTP<\/p>\n<p><strong>Packet size:\u00a0 <\/strong>N\/A<\/p>\n<p><strong>Interpacket delay<\/strong>:\u00a0N\/A<\/p>\n<p><strong>Header programability<\/strong>: N\/A<\/p>\n<p><strong>QoS tagging:<\/strong>\u00a0N\/A<\/p>\n<p><strong>Logging, reports:<\/strong> BW info<\/p>\n<p><strong>Send pcap<\/strong>: No<\/p>\n<h2 class=\"TitleHeading\">IP SORCERY<\/h2>\n<p><strong>web<\/strong>: <a href=\"http:\/\/www.the-odin.com\/ipsorcery.html\">http:\/\/www.the-odin.com\/ipsorcery.html<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong><span class=\"st\">IP Sorcery\u00a0is a TCP\/IP packet generator. It can send IP, TCP, UDP, ICMP, and IGMP packets from the console or with a GTK+ interface.<\/span>\u00a0First developed in the late 1990s it was one of the world&#8217;s first packet generators.<\/p>\n<p><strong>Licence:\u00a0<\/strong>GNU GPL v3<\/p>\n<p><strong>Platform:<\/strong>\u00a0Unix<\/p>\n<p><strong>GUI\/CLI: <\/strong>Yes\/Yes<\/p>\n<p><strong>Protocols:\u00a0<\/strong>UDP, TCP, ICMP, ARP<\/p>\n<p><strong>Packet size: <\/strong>constant<\/p>\n<p><strong>Interpacket delay<\/strong>: constant<\/p>\n<p><strong>Header programability<\/strong>: partially<\/p>\n<p><strong>QoS tagging:<\/strong>\u00a0N\/A<\/p>\n<p><strong>Logging, reports:<\/strong> N\/A<\/p>\n<p><strong>Send pcap<\/strong>: No<\/p>\n<h2>Ixia &#8211; BreakingPoint Virtual Edition (VE)<\/h2>\n<p><strong>web:\u00a0<\/strong> <a href=\"https:\/\/www.ixiacom.com\/resources\/breakingpoint-virtual-edition-ve\">https:\/\/www.ixiacom.com\/resources\/breakingpoint-virtual-edition-ve<\/a><\/p>\n<p><strong>Description: I<\/strong>xia\u2019s BreakingPoint virtual edition (VE) provides scalable real-world application and threat simulation in a deployment model that fits IT budgets by leveraging virtualization and industry-standard hardware platforms. To build resilient physical or virtual networks, you can rely on by using BreakingPoint VE to maximize security investments and optimize network architectures. Now virtualization-enabled, market-proven BreakingPoint application offers cost-effective, elastic, and sharable virtualized test capabilities that are quickly deployed and scaled across geo-diverse enterprise-wide networks..<\/p>\n<p><strong>Licence: <\/strong>commercial<\/p>\n<p><strong>Price: <\/strong>approximatelly 10700$ per year<\/p>\n<p><strong>Platform:\u00a0<\/strong>VMware ESX\/ESXi and KVM<\/p>\n<h1><a name=\"K\"><\/a>K<\/h1>\n<h2>Kute<\/h2>\n<p><strong>web:\u00a0<a href=\"http:\/\/caia.swin.edu.au\/genius\/tools\/kute\/\">\u00a0<\/a><\/strong><a href=\"http:\/\/caia.swin.edu.au\/genius\/tools\/kute\/\">http:\/\/caia.swin.edu.au\/genius\/tools\/kute\/<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>KUTE has been developed to have a maximum performance traffic generator and receiver mainly for use with Gigabit Ethernet. Standard userland tools do not have much performance in terms of packet\/s as compared to hardware testers (e.g. Smartbits).<\/p>\n<p><strong>Licence:\u00a0<\/strong><\/p>\n<p><strong>Platform: <\/strong>Linux<\/p>\n<p><strong>GUI\/CLI: <\/strong>-\/Yes<\/p>\n<p><strong>Protocols:<\/strong> UDP<\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:\u00a0<\/strong><\/p>\n<p><strong>Logging, reports:\u00a0<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h1><a name=\"#L\"><\/a>L<\/h1>\n<h1 class=\"ng-binding\">libcrafter<\/h1>\n<p><strong>web:\u00a0<\/strong><a href=\"https:\/\/code.google.com\/archive\/p\/libcrafter\/\">https:\/\/code.google.com\/archive\/p\/libcrafter\/<\/a>\u00a0 \u00a0 \u00a0<a href=\"https:\/\/github.com\/pellegre\/libcrafter\">https:\/\/github.com\/pellegre\/libcrafter<\/a><\/p>\n<p><strong>Description:<\/strong>Libcrafter is a high level library for C++ designed to make easier the creation and decoding of network packets. It is able to craft or decode packets of most common network protocols, send them on the wire, capture them and match requests and replies. It enables the creation of networking tools in a few lines with an interface very similar to Scapy. A packet is described as layers that you stack one upon the other. Fields of each layer have useful default values that you can overload.<br \/>\nThe library is designed to be used in multithreaded programs where you can\u00a0\u00a0combine several tasks simultaneously. For example, you can easily design\u00a0\u00a0something that sniffs, mangles, and sends at the same time you are doing\u00a0\u00a0an ARP-Spoofing attack.\u00a0It also contains a very naive implementation of the TCP\/IP stack (fragmentation\u00a0\u00a0is no handled yet) at user level that enables working with TCP streams. This\u00a0\u00a0facilitates the creation of tools for data injection on arbitrary connections,\u00a0\u00a0IP spoofing and TCP\/IP session hijacking.<\/p>\n<p><strong>Licence:\u00a0<\/strong><\/p>\n<p><strong>Platform:<\/strong>\u00a0Linux, Unix<\/p>\n<p><strong>GUI\/CLI: &#8211;<\/strong>\/Yes<\/p>\n<p><strong>Protocols:<\/strong> UDP,\u00a0TCP, ICMP<\/p>\n<h1 class=\"ng-binding\">libtins<\/h1>\n<p><strong>web:\u00a0<\/strong><a href=\"http:\/\/libtins.github.io\/\">http:\/\/libtins.github.io\/\u00a0<\/a>\u00a0 \u00a0 <a href=\"https:\/\/github.com\/mfontanini\/libtins\">\u00a0https:\/\/github.com\/mfontanini\/libtins<\/a><\/p>\n<p><strong>Description: l<\/strong>ibtins\u00a0is a high-level, multiplatform\u00a0C++\u00a0network packet sniffing and crafting library.\u00a0Its main purpose is to provide the\u00a0C++\u00a0developer an easy, efficient, platform and endianness-independent way to create tools which need to send, receive and manipulate network packets. It uses a BSD-2 license and it&#8217;s hosted at\u00a0<a href=\"https:\/\/github.com\/mfontanini\/libtins\">github<\/a>.<\/p>\n<p><strong>Licence: <\/strong>BSDv2<\/p>\n<p><strong>Platform:<\/strong>\u00a0Linux, Unix<\/p>\n<p><strong>GUI\/CLI: &#8211;<\/strong>\/Yes<\/p>\n<p><strong>Protocols:<\/strong>\u00a0IEEE802.11, ARP, UDP,\u00a0TCP, ICMP, HTTP, DNS<\/p>\n<h1><a name=\"M\"><\/a>M<\/h1>\n<h2>mausezahn &#8211;\u00a0a fast versatile packet generator with Cisco-cli<\/h2>\n<p><strong>web:\u00a0\u00a0<\/strong><a href=\"https:\/\/manpages.debian.org\/jessie\/netsniff-ng\/mausezahn.8.en.html\">https:\/\/manpages.debian.org\/jessie\/netsniff-ng\/mausezahn.8.en.html<\/a><\/p>\n<p><strong>Description:<\/strong> Mausezahn\u00a0is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.\u00a0Mausezahn can also be used for example as didactical tool in network labs or for security audits including penetration and DoS testing. As traffic generator Mausezahn is for example used test IP multicast or VoIP networks. Speeds close to the Ethernet limit are reachable (depending on the HW platform).<\/p>\n<p>For Debian it is Included in\u00a0netsniff-ng toolkit.<\/p>\n<p><strong>Licence:\u00a0<\/strong><\/p>\n<p><strong>Platform: <\/strong>Linux<\/p>\n<p><strong>GUI\/CLI: <\/strong>-\/Yes<\/p>\n<p><strong>Protocols:<\/strong>\u00a0ARP, BPDU, or PVST, CDP, LLDP, IP, IGMP, UDP, TCP (stateless), ICMP (partly), DNS, RTP<\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header\/packet programability<\/strong>: Yes<\/p>\n<p><strong>QoS tagging:\u00a0<\/strong><\/p>\n<p><strong>Logging, reports:\u00a0<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h2>MGEN<\/h2>\n<p><strong>web:\u00a0<\/strong><a href=\"https:\/\/www.nrl.navy.mil\/itd\/ncs\/products\/mgen\">https:\/\/www.nrl.navy.mil\/itd\/ncs\/products\/mgen<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>The Multi-Generator (MGEN) is open source software developed by the Naval Research Laboratory (NRL) PROTocol Engineering Advanced Networking (PROTEAN) Research Group. MGEN provides the ability to perform IP network performance tests and measurements using TCP and UDP\/IP traffic.<\/p>\n<p><strong>Licence<em>: <\/em><\/strong>Open source, not specified<\/p>\n<p><strong>Platform: <\/strong>Win32, Linux<\/p>\n<p><strong>Protocols:\u00a0<\/strong>UDP, TCP<\/p>\n<p><strong>Packet size: <\/strong>constant<\/p>\n<p><strong>Interpacket delay<\/strong>:\u00a0constant, exponential<\/p>\n<p><strong>Header programability<\/strong>: partially<\/p>\n<p><strong>QoS tagging:<\/strong>\u00a0Yes<\/p>\n<p><strong>Logging, reports:<\/strong>\u00a0Yes<\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h2>MikroTik &#8211; Traffic Generator<\/h2>\n<p><strong>web: <\/strong><a href=\"https:\/\/wiki.mikrotik.com\/wiki\/Manual:Tools\/Traffic_Generator\">https:\/\/wiki.mikrotik.com\/wiki\/Manual:Tools\/Traffic_Generator<\/a><\/p>\n<p><strong>Description:\u00a0 <\/strong>Traffic Generator is a tool that allows to evaluate performance of DUT (Device Under Test) or SUT (System Under Test). Tool can generate and send RAW packets over specific ports. It also collects latency and jitter values, tx\/rx rates, counts lost packets and detects Out-of-Order (OOO) packets. Traffic Generator can be used similar to bandwidth test tool as well as generate packets that will be routed back to packet generator for advanced status collection.<\/p>\n<p><strong>Licence: <\/strong>part of the Mikrotik OS<\/p>\n<p><strong>Platform:\u00a0<\/strong>Linux<\/p>\n<p><strong>Protocols:\u00a0<\/strong><\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:<\/strong><\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h2>MoonGen<\/h2>\n<p><strong>web:\u00a0<\/strong><a href=\"https:\/\/github.com\/emmericp\/MoonGen\">https:\/\/github.com\/emmericp\/MoonGen<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0<a href=\"https:\/\/www.net.in.tum.de\/research\/software\/#moongen\">\u00a0https:\/\/www.net.in.tum.de\/research\/software\/#moongen<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>MoonGen is a fully scriptable high-speed packet generator build on DPDK and LuaJIT. It can saturate a 10 GbE connection with 64 byte packets on a single CPU core while executing user-provided Lua scripts for each packet. MoonGen utilizes features of (Intel) NICs that allow to measure latencies with sub-microsecond accuracy.<\/p>\n<p><strong>Licence:\u00a0<\/strong>open, not closely specified<\/p>\n<p><strong>Platform:\u00a0<\/strong>Linux<\/p>\n<p><strong>Protocols:\u00a0<\/strong><\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:<\/strong><\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h2>mxTraf<\/h2>\n<p><strong>web:\u00a0<\/strong> <a href=\"http:\/\/mxtraf.sourceforge.net\/\">http:\/\/mxtraf.sourceforge.net\/<\/a><\/p>\n<p><strong>Description: <\/strong> <tt>mxtraf<\/tt> is a network-traffic generator program. With <tt>mxtraf<\/tt>, a small number of hosts can be used to saturate a network with a tunable mix of traffic. <tt>mxtraf<\/tt> can generate three types of traffic:<\/p>\n<p><strong>Note<\/strong>: Last release 2002 &#8211; seems dead<\/p>\n<p><strong>Licence:\u00a0<\/strong><\/p>\n<p><strong>Platform: <\/strong>Limux<\/p>\n<p><strong>Protocols:\u00a0<\/strong>UDP, TCP<\/p>\n<h1><a name=\"N\"><\/a>N<\/h1>\n<h1 class=\"ng-binding\">NetCat<\/h1>\n<p><strong>web:<\/strong><a href=\"http:\/\/nc110.sourceforge.net\/\">\u00a0http:\/\/nc110.sourceforge.net\/<\/a><\/p>\n<p><strong>Description: <\/strong>Netcat is a simple Unix utility which reads and writes data\u00a0across network connections, using TCP or UDP protocol<\/p>\n<p><strong>Licence: <\/strong>BSDv2<\/p>\n<p><strong>Platform:<\/strong>\u00a0Unix<\/p>\n<p><strong>GUI\/CLI: &#8211;<\/strong>\/Yes<\/p>\n<p><strong>Protocols:<\/strong>\u00a0IUDP,\u00a0TCP<\/p>\n<h2 class=\"TitleHeading\">NetPerf<\/h2>\n<p><strong>web<\/strong>:\u00a0<a href=\"https:\/\/github.com\/HewlettPackard\/netperf\">https:\/\/github.com\/HewlettPackard\/netperf<\/a>\u00a0 \u00a0<a href=\"https:\/\/hewlettpackard.github.io\/netperf\/\">https:\/\/hewlettpackard.github.io\/netperf\/<\/a>\u00a0\u00a0\u00a0\u00a0http:\/\/www.netperf.org\/<\/p>\n<p><strong>Description:<\/strong>i Netperf is a benchmark that can be used to measure the performance of many different types of networking (protocols UDP, TCP, SCTP). It provides tests for both unidirectional throughput, and end-to-end latency..<\/p>\n<p><strong>Licence: <\/strong>BSD Licence<\/p>\n<p><strong>Platform:<\/strong>\u00a0Linux,<\/p>\n<p><strong>GUI\/CLI: <\/strong>&#8211; \/Yes<\/p>\n<p><strong>Protocols:\u00a0<\/strong>UDP, TCP, SCTP<\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:<\/strong><\/p>\n<p><strong>Logging, reports:<\/strong>\u00a0info about BW<\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h2>NetScanTools Pro Packet Flooder Tool<\/h2>\n<p><strong>web<\/strong>:\u00a0\u00a0 <a href=\"https:\/\/www.netscantools.com\/nstpro_packet_flooder.html\">https:\/\/www.netscantools.com\/nstpro_packet_flooder.html<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong> The Packet Flooder tool is a Network Traffic Generator. It sends UDP packets to a target IPv4 or IPv6 address. You have control over the target port and payload in the UDP packets. It is multithreaded so under the right circumstances it can send UDP packets at a rate fast enough to achieve 98% or so bandwidth usage* on a 100BaseT ethernet interface. The are also timing controls that allow you to vary the rate at which packets are sent.<\/p>\n<p><strong>Licence: <\/strong>commercial, free demo for 30 days<\/p>\n<p><strong>Platform:<\/strong> Windows<\/p>\n<p><strong>GUI\/CLI: <\/strong>Yes\/-<\/p>\n<p><strong>Protocols: <\/strong>IPv4\/IPv6 &#8211; UDP<\/p>\n<p><strong>Packet size: <\/strong>Fixed\/random<\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:<\/strong><\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h2>NetScanTools Pro Packet Generator Tool<\/h2>\n<p><strong>web<\/strong>: <a href=\"https:\/\/www.netscantools.com\/nstpro_packet_generator.html\">https:\/\/www.netscantools.com\/nstpro_packet_generator.html<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>The purpose of this tool is to create a TCP, UDP, ICMP, ARP, CDP or RAW format packet or set of packets to send to a target, then observe the target&#8217;s response with a packet capturing tool like Packet Capture or Wireshark. The tool can also playback previously captured packet files. This tool can also be used to help determine where specific packet types are being lost between machines.<\/p>\n<p><strong>Licence: <\/strong>commercial, free demo for 30 days<\/p>\n<p><strong>Platform:<\/strong> Windows<\/p>\n<p><strong>GUI\/CLI: <\/strong>Yes\/-<\/p>\n<p><strong>Protocols: I<\/strong>Pv4 &#8211; TCP, UDP, ICMP, ARP, CDP or RAW<\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>: Yes<\/p>\n<p><strong>QoS tagging:<\/strong><\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>: Yes<\/p>\n<h2>Nping<\/h2>\n<p><strong>web<\/strong>: <a href=\"https:\/\/nmap.org\/nping\/\">https:\/\/nmap.org\/nping\/<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>Nping is an open source tool for network packet generation, response analysis and response time measurement. Nping can generate network packets for a wide range of protocols, allowing users full control over protocol headers. While Nping can be used as a simple ping utility to detect active hosts, it can also be used as a raw packet generator for network stack stress testing, ARP poisoning, Denial of Service attacks, route tracing, etc. Nping&#8217;s novel echo mode lets users see how packets change in transit between the source and destination hosts. That&#8217;s a great way to understand firewall rules, detect packet corruption, and more.<\/p>\n<p><strong>Licence:\u00a0<\/strong>GPLv2<\/p>\n<p><strong>Platform:<\/strong>\u00a0Linux, Mac, Windows<\/p>\n<p><strong>GUI\/CLI: <\/strong>Yes\/Yes<\/p>\n<p><strong>Protocols:\u00a0<\/strong>UDP, TCP, ICMP, ARP<\/p>\n<p><strong>Packet size: <\/strong>constant<\/p>\n<p><strong>Interpacket delay<\/strong>:\u00a0constant,\u00a0continuous<\/p>\n<p><strong>Header programability<\/strong>: Yes<\/p>\n<p><strong>QoS tagging:<\/strong>\u00a0Yes<\/p>\n<p><strong>Logging, reports:<\/strong>\u00a0Yes<\/p>\n<p><strong>Send pcap:<\/strong><\/p>\n<h1><a name=\"O\"><\/a>O<\/h1>\n<h2>Ostinato<\/h2>\n<p><strong>web<\/strong>: <a href=\"https:\/\/code.google.com\/p\/ostinato\/\">https:\/\/code.google.com\/p\/ostinato\/<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>Ostinato is an open-source network packet and traffic generator and analyzer with a friendly GUI. It aims to be &#8222;Wireshark in Reverse&#8220; and become complementary to Wireshark. It features custom packet crafting with editing of any field for several protocols: Ethernet, 802.3, LLC SNAP, VLAN (with Q-in-Q), ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunneling, TCP, UDP, ICMPv4, ICMPv6, HTTP, SIP, RTSP, NNTP, etc. It is useful for both functional and performance testing.<\/p>\n<p><strong>Licence:\u00a0<\/strong>GNU GPL v3<\/p>\n<p><strong>Platform:<\/strong>\u00a0BSD, Linux, Mac, Windows<\/p>\n<p><strong>Protocols: <\/strong>see description<\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:<\/strong><\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>: Yes<\/p>\n<h1><a name=\"P\"><\/a>P<\/h1>\n<h2>PacketSender<\/h2>\n<p><strong>web<\/strong>: <a href=\"https:\/\/packetsender.com\/\">https:\/\/packetsender.com\/<\/a>\u00a0 \u00a0<a href=\"https:\/\/github.com\/dannagle\/PacketSender\">https:\/\/github.com\/dannagle\/PacketSender<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>Packet Sender is an open source utility to allow sending and receiving TCP, UDP, and SSL (encrypted TCP) packets. The mainline branch officially supports Windows, Mac, and Desktop Linux (with Qt). Other places may recompile and redistribute Packet Sender..<\/p>\n<p><strong>Licence:\u00a0<\/strong>GPLv2<\/p>\n<p><strong>Platform:<\/strong>\u00a0Linux, Mac, Windows<\/p>\n<p><strong>GUI\/CLI: <\/strong>Yes\/Yes<\/p>\n<p><strong>Protocols:\u00a0<\/strong>UDP, TCP<\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:<\/strong><\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h2>packETH<\/h2>\n<p><strong>web<\/strong>:\u00a0<a href=\"http:\/\/packeth.sourceforge.net\/packeth\/Home.html\">http:\/\/packeth.sourceforge.net\/packeth\/Home.html<\/a>\u00a0\u00a0\u00a0<a href=\"https:\/\/github.com\/jemcek\/packETH\">\u00a0https:\/\/github.com\/jemcek\/packETH<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>packETH\u00a0 is GUI and CLI packet generator tool for ethernet. It allows you to create and send any possible packet or sequence of packets on the ethernet link. It is very simple to use, powerful and supports many adjustments of parameters while sending.<\/p>\n<p><strong>Licence:\u00a0<\/strong><\/p>\n<p><strong>Platform:<\/strong>\u00a0Mac,Win, Linux,<\/p>\n<p><strong>GUI\/CLI: <\/strong>Yes\/Yes<\/p>\n<p><strong>Protocols:\u00a0<\/strong>vlan, ethernet, IPv4\/v6, UDP,\u00a0TCP, ICMP, ICMPv6,\u00a0IGMP, ARP<\/p>\n<p><strong>Packet size: <\/strong>constant<\/p>\n<p><strong>Interpacket delay<\/strong>:\u00a0constant, random,\u00a0continuous<\/p>\n<p><strong>Header programability<\/strong>: Yes<\/p>\n<p><strong>QoS tagging: <\/strong>Yes<\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>: Yes<\/p>\n<h1><a name=\"R\"><\/a>R<\/h1>\n<h2>Rude &amp; Crude<\/h2>\n<p><strong>web:\u00a0<\/strong><a href=\"http:\/\/rude.sourceforge.net\/\">http:\/\/rude.sourceforge.net\/<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>RUDE stands for Real-time UDP Data Emitter and CRUDE for Collector for RUDE. RUDE is a small and flexible program that generates traffic to the network, which can be received and logged on the other side of the network with the CRUDE. Currently these programs can generate and measure only UDP traffic.<\/p>\n<p>Seems unsupported for a long period.<\/p>\n<p><strong>Licence:\u00a0<\/strong>GPLv2<\/p>\n<p><strong>Platform:\u00a0<\/strong>Linux<\/p>\n<p><strong>GUI\/CLI: <\/strong>-\/Yes<\/p>\n<p><strong>Protocols:\u00a0<\/strong><\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:\u00a0<\/strong>probably<\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h1><a name=\"S\"><\/a>S<\/h1>\n<h2>Scapy<\/h2>\n<p><strong>web:\u00a0<\/strong><a href=\"https:\/\/scapy.net\/\">https:\/\/scapy.net\/<\/a><\/p>\n<p><strong>Description:\u00a0<\/strong>Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, tethereal, p0f, etc.). It also performs very well at a lot of other specific tasks that most other tools can\u2019t handle, like sending invalid frames, injecting your own 802.11 frames, combining technics (VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted channel, \u2026), etc.<\/p>\n<p><strong>Licence:\u00a0<\/strong><\/p>\n<p><strong>Platform:<\/strong>\u00a0Linux, Unix<\/p>\n<p><strong>GUI\/CLI: &#8211;<\/strong>\/Yes<\/p>\n<p><strong>Protocols:<\/strong> UDP,\u00a0TCP, ICMP<\/p>\n<h2>Simple Packet Sender<\/h2>\n<p><strong>web<\/strong>:\u00a0<a href=\"https:\/\/sites.google.com\/site\/simplepacketsender\/\">https:\/\/sites.google.com\/site\/simplepacketsender\/<\/a><\/p>\n<p><strong>Description:\u00a0\u00a0<\/strong>A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4. Written in C on Linux with GUI built using GTK+ and released under GPLv3. Does not require pcap.<\/p>\n<p><strong>Licence:\u00a0<\/strong><\/p>\n<p><strong>Platform:<\/strong>\u00a0Linux,<\/p>\n<p><strong>GUI\/CLI: <\/strong>Yes\/-<\/p>\n<p><strong>Protocols:<\/strong> UDP,\u00a0TCP, ICMP<\/p>\n<p><strong>Packet size: <\/strong>constant<\/p>\n<p><strong>Interpacket delay<\/strong>:\u00a0constant, continuous<\/p>\n<p><strong>Header programability<\/strong>: Yes<\/p>\n<p><strong>QoS tagging: <\/strong>Yes<\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h1><a name=\"T\"><\/a>T<\/h1>\n<h2>trafgn &#8211; a fast, multithreaded network packet generator<\/h2>\n<p><strong>web:\u00a0\u00a0<\/strong><\/p>\n<p><strong>Description:<\/strong>\u00a0trafgen is a fast, zero-copy network traffic generator for debugging, performance evaluation, and fuzz-testing. trafgen utilizes the\u00a0<a href=\"https:\/\/manpages.debian.org\/jessie\/manpages\/packet.7.en.html\">packet(7)<\/a>\u00a0socket interface of Linux which postpones complete control over packet data and packet headers into the user space. It has a powerful packet configuration language, which is rather low-level and not limited to particular protocols. Thus, trafgen can be used for many purposes. Its only limitation is that it cannot mimic full streams resp. sessions. However, it is very useful for various kinds of load testing in order to analyze and subsequently improve systems behaviour under DoS attack scenarios, for instance.<\/p>\n<p>For Debian it is Included in\u00a0netsniff-ng toolkit.<\/p>\n<p><strong>Licence: <\/strong>open<\/p>\n<p><strong>Platform: <\/strong>Linux<\/p>\n<p><strong>GUI\/CLI: <\/strong>-\/Yes<\/p>\n<p><strong>Protocols:<\/strong><\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header\/packet programability<\/strong>:<\/p>\n<p><strong>QoS tagging:\u00a0<\/strong><\/p>\n<p><strong>Logging, reports:\u00a0<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h2>TRex &#8211; realistic traffic generator<\/h2>\n<p><strong>web:\u00a0 <\/strong><a href=\"http:\/\/trex-tgn.cisco.com\/\">http:\/\/trex-tgn.cisco.com\/<\/a>\u00a0 \u00a0\u00a0<a href=\"https:\/\/github.com\/cisco-system-traffic-generator\/trex-core\">https:\/\/github.com\/cisco-system-traffic-generator\/trex-core<\/a><\/p>\n<p><strong>Description: <\/strong>TRex is an open source, low cost, stateful and stateless traffic generator fuelled by DPDK. It generates L4-7 traffic based on pre-processing and smart replay of real traffic templates . TRex amplifies both client and server side traffic and can scale up to 200Gb\/sec with one UCS.<\/p>\n<p>TRex Stateless functionality includes support for multiple streams, the ability to change any packet field and provides per stream statistics, latency and jitter.<\/p>\n<p><strong>Licence: <\/strong>open-source<\/p>\n<p><strong>Platform: <\/strong>Linux<\/p>\n<p><strong>GUI\/CLI: <\/strong>-\/Yes<\/p>\n<p><strong>Protocols:<\/strong> UDP<\/p>\n<p><strong>Packet size:\u00a0<\/strong><\/p>\n<p><strong>Interpacket delay<\/strong>:<\/p>\n<p><strong>Header programability<\/strong>:<\/p>\n<p><strong>QoS tagging:\u00a0<\/strong><\/p>\n<p><strong>Logging, reports:<\/strong><\/p>\n<p><strong>Send pcap<\/strong>:<\/p>\n<h1><a name=\"U\"><\/a>U<\/h1>\n<h2>UDPGen<\/h2>\n<p><strong>web:\u00a0\u00a0<\/strong><a href=\"https:\/\/github.com\/jtyr\/udpgen\">https:\/\/github.com\/jtyr\/udpgen<\/a>\u00a0 \u00a0 \u00a0<a href=\"https:\/\/github.com\/steerapi\/udpgen\">https:\/\/github.com\/steerapi\/udpgen<\/a>\u00a0 \u00a0 \u00a0<a href=\"http:\/\/www.cds.unibe.ch\/research\/software\/udpgen\/\">http:\/\/www.cds.unibe.ch\/research\/software\/udpgen\/<\/a><\/p>\n<p><strong>Description: <\/strong>UDPGen is a simple UDP packet generator which allows to send UDP packets into\u00a0the multicast network.<\/p>\n<p><strong>Licence: <\/strong>GPLv3<\/p>\n<p><strong>Platform:<\/strong><\/p>\n<h2>UDP Generator<\/h2>\n<p><strong>web:\u00a0 <\/strong><a href=\"http:\/\/www.citi.umich.edu\/projects\/qbone\/generator.html\">http:\/\/www.citi.umich.edu\/projects\/qbone\/generator.html<\/a><\/p>\n<p><strong>Description: <\/strong>The traffic generator application is designed to be able to fill a 100Mbit Ethernet, and account for all data sent. Thus, reserved bandwidth flows and\/or best effort flows can be sent, competing for the resources of a 100Mbit Ethernet. Packets are marked with a sequence number. Per second bandwidth and packet loss data are collected..<\/p>\n<p><strong>Licence: <\/strong>GPLv3<\/p>\n<p><strong>Platform: <\/strong>Solaris, FeeeBSD, AOX, Limux<\/p>\n<h1><a name=\"W\"><\/a>W<\/h1>\n<h1 class=\"\">WAN Killer Network Traffic Generator<\/h1>\n<p><strong>web:\u00a0\u00a0<a href=\"https:\/\/www.solarwinds.com\/topics\/traffic-generator-wan-killer\">https:\/\/www.solarwinds.com\/topics\/traffic-generator-wan-killer<\/a><\/strong><\/p>\n<p><strong>Description:\u00a0<\/strong>WAN Killer helps to interactively test connections and adjust the IP traffic generated to achieve the desired network load based on your requirements.<\/p>\n<p>WAN Killer is designed to:<\/p>\n<ul>\n<li>Set the IP address and hostname you want to send the random traffic to<\/li>\n<li>Adjust port numbers, packet size, and percentage of bandwidth to send<\/li>\n<li>Modify the Differentiated Serves Code Point (DSCP) and Explicit Congest Notification (ECN) settings<\/li>\n<\/ul>\n<p><strong>Licence: <\/strong>Free 14-days trial<\/p>\n<p><strong>Platform: <\/strong>Win<\/p>\n<p><strong>GUI\/CLI: <\/strong>Yes\/-<\/p>\n<p><strong>Protocols:\u00a0<\/strong> UDP\/TCP<\/p>\n<p><strong>Packet size: <\/strong>Yes (or percentage of bandwidth)<\/p>\n<p><strong>Interpacket delay<\/strong>: N\/A<\/p>\n<p><strong>Header programability<\/strong>: N\/A<\/p>\n<p><strong>QoS tagging: <\/strong>DSCP<\/p>\n<p><strong>Logging, reports: N\/A<\/strong><\/p>\n<p><strong>Send pcap:\u00a0\u00a0<\/strong>N\/A<\/p>\n<h2>WireEdit<\/h2>\n<p><strong>web:\u00a0\u00a0<\/strong><a href=\"https:\/\/omnipacket.com\/downloads\">https:\/\/omnipacket.com\/downloads<\/a><\/p>\n<p><strong>Description: <\/strong>WireEdit is a full featured WYSIWYG network packets editor. That means, you can edit all layers of packets in a simple interface. This tool is free to use, but you will have to contact company to obtain the usage right. I..<\/p>\n<p><strong>Licence: <\/strong>FreeWare<\/p>\n<p><strong>Platform: <\/strong>Win7, Mac, Linux<\/p>\n<p><strong>GUI\/CLI: <\/strong>Yes\/-<\/p>\n<p><strong>Protocols:<\/strong> a lot:\u00a0 Ethernet, IPv4, IPv6, UDP, TCP, SCTP, ARP, RARP, DHCP, DHCPv6, ICMP, ICMPv6, IGMP, DNS, LLDP, RSVP, FTP, NETBIOS, GRE, IMAP, POP3, RTCP, RTP, SSH, TELNET, NTP, LDAP, XMPP, VLAN, VXLAN, CIFS\/SMB v1 (original), BGP, OSPF, SMB3, iSCSI, SCSI, HTTP\/1.1, OpenFlow 1.0-1.3, SIP, SDP, MSRP, MGCP, MEGACO (H.248), H.245, H.323, CISCO Skinny, Q.931\/H.225, SCCP, SCMG, SS7 ISUP, TCAP, GSM MAP R4, GSM SM-TP, M3UA, M2UA, M2PA, CAPWAP, IEEE 802.11<\/p>","protected":false},"excerpt":{"rendered":"<p>\n\t<span style=\"line-height: 13.1999998092651px;\">The page provides summarized view of traffic generators.<\/span><\/p>\n<p style=\"margin-top: 0px; margin-bottom: 0px; line-height: 13.1999998092651px;\">\n\tA B&nbsp;C&nbsp;D E F G H I J K L&nbsp;<a href=\"#M\">M<\/a>&nbsp;N&nbsp;<a href=\"#O\">O<\/a>&nbsp;P&nbsp;R&nbsp;S <a href=\"#M\">T<\/a> V W X Y&nbsp;<a href=\"https:\/\/nil-test.kis.fri.uniza.sk\/monitoring-management-measurement\/tools\/monitoring-tools-list#Z\">Z<\/a><\/p>\n<p>\n\t&nbsp;<\/p>","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[823],"tags":[],"class_list":["post-647","post","type-post","status-publish","format-standard","hentry","category-traffic_generators-en"],"taxonomy_info":{"category":[{"value":823,"label":"Traffic generators"}]},"featured_image_src_large":false,"author_info":{"display_name":"admin","author_link":"https:\/\/nil.uniza.sk\/en\/author\/admin\/"},"comment_info":10,"category_info":[{"term_id":823,"name":"Traffic generators","slug":"traffic_generators-en","term_group":0,"term_taxonomy_id":821,"taxonomy":"category","description":"","parent":0,"count":1,"filter":"raw","cat_ID":823,"category_count":1,"category_description":"","cat_name":"Traffic generators","category_nicename":"traffic_generators-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/posts\/647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/comments?post=647"}],"version-history":[{"count":0,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/posts\/647\/revisions"}],"wp:attachment":[{"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/media?parent=647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/categories?post=647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/tags?post=647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}