diff options
author | decke <decke@FreeBSD.org> | 2018-11-09 17:01:25 +0800 |
---|---|---|
committer | decke <decke@FreeBSD.org> | 2018-11-09 17:01:25 +0800 |
commit | 0e4e76fba4bf62acb8f5e667c992a1ea20c87258 (patch) | |
tree | b7f57c9f1737756b653d84f6812f5a8e122abb25 /databases/php72-pdo_pgsql | |
parent | 21534f9a7615e9db5f8abee78356b2dc89af2c2a (diff) | |
download | freebsd-ports-gnome-0e4e76fba4bf62acb8f5e667c992a1ea20c87258.tar.gz freebsd-ports-gnome-0e4e76fba4bf62acb8f5e667c992a1ea20c87258.tar.zst freebsd-ports-gnome-0e4e76fba4bf62acb8f5e667c992a1ea20c87258.zip |
Maltrail is a malicious traffic detection system, utilizing publicly
available (black)lists containing malicious and/or generally suspicious
trails, along with static trails compiled from various AV reports and
custom user defined lists, where trail can be anything from domain name
(e.g. zvpprsensinaix.com for Banjori malware),
URL (e.g. http://109.162.38.120/harsh02.exe for known malicious executable),
IP address (e.g. 185.130.5.231 for known attacker) or HTTP User-Agent header
value (e.g. sqlmap for automatic SQL injection and database takeover tool).
Also, it uses (optional) advanced heuristic mechanisms that can help in
discovery of unknown threats (e.g. new malware).
WWW: https://github.com/stamparm/maltrail
PR: 233074
Submitted by: Michael Muenz <m.muenz@gmail.com>
Diffstat (limited to 'databases/php72-pdo_pgsql')
0 files changed, 0 insertions, 0 deletions