Network Attacks + Packet Sniffer
Ran multiple network attacks in a sandbox. The network was created using the CORE simulation environment. I also created a packet sniffer in the same sandbox to verify what packets were being sent and received.

There are three attacks I ran. The first one was a packet sniffer that I built using Python code. Wireshark was used to verify whether the packet sniffer was working as expected.
The second attack was an ICMP flood attack. This involved sending a flood of ICMP attacks to the victim. An additional layer feature of the ICMP flood attack was MAC address spoofing.
The third attack to be done was a TCP SYN flooding attack. The victim host was sent a flood of TCP SYN messages, thereby loading the host with half open connections.