-
There are notes about this version not supporting "capturing data" but isn't completely true. While it is unable to use interfaces, pipes allow wireshark to read captured packets from another applicat…
-
[Access control worksheet.docx](https://github.com/MohammedFarooqui/Cybersecurity-projects/files/13639983/Access.control.worksheet.docx)
[Activity Template_ Data leak worksheet.docx](https://github.…
-
# Content Management
![image](https://cloud.githubusercontent.com/assets/25837010/23054049/5131c774-f4ff-11e6-893b-a27271dbe3c4.png)
# Server-side Languages
![image](https://cloud.githubuserc…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Platform
all
### App version
_No response_
### Feature
ISPs may use DPI technologies to further monitor tr…
-
# Task Description: Cyber Security Dashboard
## Background
As a company dealing with sensitive data, it is crucial to keep track of our cyber security stats to ensure the safety and integrity of…
-
# Goals
Stateless Validation is alternative design for phase 2 of sharding that does not require state rollback to mainnet. It involves significant changes to different parts of the protocol. The g…
-
**Is your feature request related to a problem? Please describe.**
I want to process Netflow/IPFIX data. FileBeat and LogStash, for instance, have an input plugin to do so. FluentD too.
**Describe…
-
Hi,
Found TrickBot.
SHA256: dc2e70d7deaac4e2d85851e2b7c484565b20ba329e4a27ff3611175372eadc96)
[VT Scan](https://www.virustotal.com/file/dc2e70d7deaac4e2d85851e2b7c484565b20ba329e4a27ff3611175372ea…
-
IP prefix preservation can be useful for analyzing the structure of network traffic. A pure HMAC-MD5 approach loses this structure. It may be useful to have such an option.
See recommended [best pr…
-
**Is your enhancement request related to a problem? Please describe.**
Currently only TCP, UDP, and SCTP protocols are supported, but there are more protocols (ICMP, ICMPv6 are the most popular reque…