Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

An Open-Source Tool to See Through Encrypted Traffic in Linux systems

Posted on June 10, 2025June 10, 2025 By CWS

Qpoint has launched Qtap, an open-source eBPF agent for monitoring community visitors in Linux techniques. It hooks into TLS/SSL features to seize knowledge earlier than and after encryption, displaying unencrypted visitors with particulars like course of, container, host, person, and protocol.

Qtap runs out-of-band with low overhead, including no latency or disrupting apps.

Qtap makes it simple to see what’s occurring in your community, particularly for complicated apps, third-party companies, or legacy techniques. It’s light-weight, safe, and works with out invasive setup.

What Qtap Does

Qtap empowers builders, safety professionals, and system directors to achieve deep insights into egress visitors with out modifying functions, putting in proxies, or managing certificates. Whether or not you’re auditing delicate knowledge, debugging community points, or exploring legacy techniques, Qtap gives a transparent view of what’s occurring in your community.

Key Options and Use Circumstances

Qtap’s versatility makes it a foundational part for observability pipelines and customized options like Qpoint. Its key use circumstances embody:

Safety Auditing: Confirm that delicate knowledge isn’t being uncovered in community communications.

Community Debugging: Diagnose API errors, misconfigured parameters, or sudden responses with real-time visitors insights.

API Growth: Guarantee functions ship appropriately formatted requests and deal with responses as anticipated.

Third-Occasion Integrations: Verify knowledge exchanges with exterior companies align with documentation.

Studying & Exploration: Research protocol habits by observing reside visitors.

Legacy Techniques: Acquire insights into poorly documented techniques with out supply code entry.

Validation Testing: Verify software adjustments don’t disrupt community communication patterns.

Find out how to Begin

Attempt Qtap in Demo Mode to see visitors in your terminal:

bash

$ curl -s | sudo sh

To put in and run:

bash

# Set up Qtap
$ curl -s | sudo sh

# Run with defaults
$ sudo qtap

Qtap wants Linux kernel 5.10+ with BTF and eBPF enabled (examine /sys/kernel/btf/vmlinux). It requires elevated permissions: sudo on the host or CAP_BPF and privileged mode in Docker.

Growing Qtap

Qtap is on GitHub. Builders can contribute utilizing:

OS: Linux (kernel 5.10+). MacOS customers can use Lima for a Linux VM.

Instruments: Go 1.24+, make, clang 14 (required), clang-tidy (non-obligatory).

bash

Clone and construct:

$ git clone
$ make construct

Widespread make instructions:

construct: Builds eBPF binaries and Go app.

generate: Creates eBPF binaries.

run: Begins a debug occasion.

ci: Runs CI checks.

Qtap is in early growth. APIs might change, and documentation is likely to be incomplete. Suggestions is welcome through GitHub Points or Discussions. Contributors conform to a Contributor License Settlement for open-source and industrial use.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Encrypted, Linux, OpenSource, Systems, Tool, Traffic

Post navigation

Previous Post: Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users
Next Post: FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

Related Posts

Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads Cyber Security News
PoC Published For Fortinet 0-Day Vulnerability That Being Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover
  • The AI Arms Race: Deepfake Generation vs. Detection
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior
  • OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover
  • The AI Arms Race: Deepfake Generation vs. Detection
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior
  • OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News