Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

An Open-Source Tool to See Through Encrypted Traffic in Linux systems

Posted on June 10, 2025June 10, 2025 By CWS

Qpoint has launched Qtap, an open-source eBPF agent for monitoring community visitors in Linux techniques. It hooks into TLS/SSL features to seize knowledge earlier than and after encryption, displaying unencrypted visitors with particulars like course of, container, host, person, and protocol.

Qtap runs out-of-band with low overhead, including no latency or disrupting apps.

Qtap makes it simple to see what’s occurring in your community, particularly for complicated apps, third-party companies, or legacy techniques. It’s light-weight, safe, and works with out invasive setup.

What Qtap Does

Qtap empowers builders, safety professionals, and system directors to achieve deep insights into egress visitors with out modifying functions, putting in proxies, or managing certificates. Whether or not you’re auditing delicate knowledge, debugging community points, or exploring legacy techniques, Qtap gives a transparent view of what’s occurring in your community.

Key Options and Use Circumstances

Qtap’s versatility makes it a foundational part for observability pipelines and customized options like Qpoint. Its key use circumstances embody:

Safety Auditing: Confirm that delicate knowledge isn’t being uncovered in community communications.

Community Debugging: Diagnose API errors, misconfigured parameters, or sudden responses with real-time visitors insights.

API Growth: Guarantee functions ship appropriately formatted requests and deal with responses as anticipated.

Third-Occasion Integrations: Verify knowledge exchanges with exterior companies align with documentation.

Studying & Exploration: Research protocol habits by observing reside visitors.

Legacy Techniques: Acquire insights into poorly documented techniques with out supply code entry.

Validation Testing: Verify software adjustments don’t disrupt community communication patterns.

Find out how to Begin

Attempt Qtap in Demo Mode to see visitors in your terminal:

bash

$ curl -s | sudo sh

To put in and run:

bash

# Set up Qtap
$ curl -s | sudo sh

# Run with defaults
$ sudo qtap

Qtap wants Linux kernel 5.10+ with BTF and eBPF enabled (examine /sys/kernel/btf/vmlinux). It requires elevated permissions: sudo on the host or CAP_BPF and privileged mode in Docker.

Growing Qtap

Qtap is on GitHub. Builders can contribute utilizing:

OS: Linux (kernel 5.10+). MacOS customers can use Lima for a Linux VM.

Instruments: Go 1.24+, make, clang 14 (required), clang-tidy (non-obligatory).

bash

Clone and construct:

$ git clone
$ make construct

Widespread make instructions:

construct: Builds eBPF binaries and Go app.

generate: Creates eBPF binaries.

run: Begins a debug occasion.

ci: Runs CI checks.

Qtap is in early growth. APIs might change, and documentation is likely to be incomplete. Suggestions is welcome through GitHub Points or Discussions. Contributors conform to a Contributor License Settlement for open-source and industrial use.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Encrypted, Linux, OpenSource, Systems, Tool, Traffic

Post navigation

Previous Post: Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users
Next Post: FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

Related Posts

Malicious VS Code Extensions Attacking Windows Solidity Developers to Steal Login Credentials Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
SAP’s July 2025 Patch Day Cyber Security News
New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER Cyber Security News
Multiple Ivanti Endpoint Manager Vulnerabilities Allows Remote Code Execution Cyber Security News
GitLab Security Update – Patch for Multiple Vulnerabilities in Community and Enterprise Edition Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution
  • Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns
  • Tea App Takes Messaging System Offline After Second Security Issue Reported
  • How to Respond to a Phishing Test in Your Company
  • ArmouryLoader Bypassing System Security Protections and Inject Malicious Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution
  • Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns
  • Tea App Takes Messaging System Offline After Second Security Issue Reported
  • How to Respond to a Phishing Test in Your Company
  • ArmouryLoader Bypassing System Security Protections and Inject Malicious Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News