Instantly generate malicious network traffic patterns with flightsim to evaluate your security controls and threat detection stack. The utility performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
This recent blog post describes the flightsim utility and its various modules:
Enable snaps on Arch Linux and install AlphaSOC flightsim
Snaps are applications packaged with all their dependencies to run on all popular Linux distributions from a single build. They update automatically and roll back gracefully.
Snaps are discoverable and installable from the Snap Store, an app store with an audience of millions.
Enable snapd
On Arch Linux, snap can be installed from the Arch User Repository (AUR).
The manual build process is the Arch-supported
install method for AUR packages, and you’ll need the prerequisites
installed before you can install any AUR package. You can then install snap with the following:
git clone https://aur.archlinux.org/snapd.git
cd snapd
makepkg -si
Once installed, the systemd unit that manages the main snap communication socket needs to be enabled:
sudo systemctl enable --now snapd.socket
If AppArmor is enabled in your system, enable the service which loads AppArmor profiles for snaps: