Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

An Open-Source Tool to See Through Encrypted Traffic in Linux systems

Posted on June 10, 2025June 10, 2025 By CWS

Qpoint has launched Qtap, an open-source eBPF agent for monitoring community visitors in Linux techniques. It hooks into TLS/SSL features to seize knowledge earlier than and after encryption, displaying unencrypted visitors with particulars like course of, container, host, person, and protocol.

Qtap runs out-of-band with low overhead, including no latency or disrupting apps.

Qtap makes it simple to see what’s occurring in your community, particularly for complicated apps, third-party companies, or legacy techniques. It’s light-weight, safe, and works with out invasive setup.

What Qtap Does

Qtap empowers builders, safety professionals, and system directors to achieve deep insights into egress visitors with out modifying functions, putting in proxies, or managing certificates. Whether or not you’re auditing delicate knowledge, debugging community points, or exploring legacy techniques, Qtap gives a transparent view of what’s occurring in your community.

Key Options and Use Circumstances

Qtap’s versatility makes it a foundational part for observability pipelines and customized options like Qpoint. Its key use circumstances embody:

Safety Auditing: Confirm that delicate knowledge isn’t being uncovered in community communications.

Community Debugging: Diagnose API errors, misconfigured parameters, or sudden responses with real-time visitors insights.

API Growth: Guarantee functions ship appropriately formatted requests and deal with responses as anticipated.

Third-Occasion Integrations: Verify knowledge exchanges with exterior companies align with documentation.

Studying & Exploration: Research protocol habits by observing reside visitors.

Legacy Techniques: Acquire insights into poorly documented techniques with out supply code entry.

Validation Testing: Verify software adjustments don’t disrupt community communication patterns.

Find out how to Begin

Attempt Qtap in Demo Mode to see visitors in your terminal:

bash

$ curl -s | sudo sh

To put in and run:

bash

# Set up Qtap
$ curl -s | sudo sh

# Run with defaults
$ sudo qtap

Qtap wants Linux kernel 5.10+ with BTF and eBPF enabled (examine /sys/kernel/btf/vmlinux). It requires elevated permissions: sudo on the host or CAP_BPF and privileged mode in Docker.

Growing Qtap

Qtap is on GitHub. Builders can contribute utilizing:

OS: Linux (kernel 5.10+). MacOS customers can use Lima for a Linux VM.

Instruments: Go 1.24+, make, clang 14 (required), clang-tidy (non-obligatory).

bash

Clone and construct:

$ git clone
$ make construct

Widespread make instructions:

construct: Builds eBPF binaries and Go app.

generate: Creates eBPF binaries.

run: Begins a debug occasion.

ci: Runs CI checks.

Qtap is in early growth. APIs might change, and documentation is likely to be incomplete. Suggestions is welcome through GitHub Points or Discussions. Contributors conform to a Contributor License Settlement for open-source and industrial use.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Encrypted, Linux, OpenSource, Systems, Tool, Traffic

Post navigation

Previous Post: Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users
Next Post: FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

Related Posts

Beware of Typosquatted Malicious PyPI Packages That Delivers SilentSync RAT Cyber Security News
Hackers Abuse EV Certificates to Sign Completely Undetectable DMG Malware Cyber Security News
Chinese ‘Salt Typhoon’ Hackers Hijacked US National Guard Network for Nearly a Year Cyber Security News
Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks Cyber Security News
SAP’s July 2025 Patch Day Cyber Security News
Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide
  • Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
  • New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts
  • 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester
  • PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide
  • Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
  • New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts
  • 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester
  • PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News