aboutsummaryrefslogtreecommitdiffstats
path: root/databases/php72-pdo_pgsql
diff options
context:
space:
mode:
authordecke <decke@FreeBSD.org>2018-11-09 17:01:25 +0800
committerdecke <decke@FreeBSD.org>2018-11-09 17:01:25 +0800
commit0e4e76fba4bf62acb8f5e667c992a1ea20c87258 (patch)
treeb7f57c9f1737756b653d84f6812f5a8e122abb25 /databases/php72-pdo_pgsql
parent21534f9a7615e9db5f8abee78356b2dc89af2c2a (diff)
downloadfreebsd-ports-gnome-0e4e76fba4bf62acb8f5e667c992a1ea20c87258.tar.gz
freebsd-ports-gnome-0e4e76fba4bf62acb8f5e667c992a1ea20c87258.tar.zst
freebsd-ports-gnome-0e4e76fba4bf62acb8f5e667c992a1ea20c87258.zip
Maltrail is a malicious traffic detection system, utilizing publicly
available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. http://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware). WWW: https://github.com/stamparm/maltrail PR: 233074 Submitted by: Michael Muenz <m.muenz@gmail.com>
Diffstat (limited to 'databases/php72-pdo_pgsql')
0 files changed, 0 insertions, 0 deletions