Need help with flightsim?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

537 Stars 99 Forks Other 107 Commits 13 Opened issues


A utility to generate malicious network traffic and evaluate controls

Services available


Need anything else?

Contributors list

Network Flight Simulator

flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.


Download the latest flightsim binary for your OS from the GitHub Releases page. Alternatively, the utility can be built using Golang in any environment (e.g. Linux, MacOS, Windows), as follows:

go get -u

Running Network Flight Simulator

Upon installation, test flightsim as follows:

$ flightsim --help

AlphaSOC Network Flight Simulator™ (

flightsim is an application which generates malicious network traffic for security teams to evaluate security controls (e.g. firewalls) and ensure that monitoring tools are able to detect malicious traffic.

Usage: flightsim [arguments]

Available Commands: run Run all modules, or a particular module version Prints the version number

Cheatsheet: flightsim run Run all the modules flightsim run c2 Simulate C2 traffic flightsim run c2:trickbot Simulate C2 traffic for the TrickBot family

The utility runs individual modules to generate malicious traffic. To perform all available tests, simply use

flightsim run
which will generate traffic using the first available non-loopback network interface. Note: when running many modules, flightsim will gather destination addresses from the AlphaSOC API, so requires egress Internet access.

To list the available modules, use

flightsim run --help
. To execute a particular test, use
flightsim run 
, as below.
$ flightsim run --help
usage: flightsim run [flags] [modules]

To run all available simulators, call:

flightsim run

To run a specific module:

flightsim run c2

Available modules:

c2, dga, miner, scan, sink, spambot, tunnel-dns, tunnel-icmp

Available flags: -dry print actions without performing any network activity -fast reduce sleep intervals between simulation events -iface string network interface or local IP address to use -size int number of hosts generated for each simulator

$ flightsim run dga

AlphaSOC Network Flight Simulator™ ( The IP address of the network interface is The current time is 23-Jan-20 11:33:21

11:33:21 [dga] Generating a list of DGA domains 11:33:21 [dga] Resolving 11:33:22 [dga] Resolving 11:33:23 [dga] Resolving 11:33:24 [dga] Resolving 11:33:25 [dga] Resolving 11:33:26 [dga] Resolving 11:33:27 [dga] Resolving 11:33:28 [dga] Resolving 11:33:29 [dga] Resolving 11:33:30 [dga] Resolving 11:33:31 [dga] Resolving 11:33:32 [dga] Resolving 11:33:33 [dga] Resolving 11:33:34 [dga] Resolving 11:33:35 [dga] Resolving 11:33:35 [dga] Done (15/15)

All done! Check your SIEM for alerts using the timestamps and details above.

Description of Modules

The modules packaged with the utility are listed in the table below.

| Module | Description | | ------------- | ----------------------------------------------------------------------------- | |

| Generates both DNS and IP traffic to a random list of known C2 destinations | |
| Simulates DGA traffic using random labels and top-level domains | |
| Generates Stratum mining protocol traffic to known cryptomining pools | |
| Performs a port scan of random RFC 5737 addresses using common TCP ports | |
| Connects to known sinkholed destinations run by security researchers | |
| Resolves and connects to random Internet SMTP servers to simulate a spam bot | |
| Generates DNS tunneling requests to * | |
| Generates ICMP tunneling traffic to an Internet service operated by AlphaSOC |

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.