What are you looking for?
Type a path, image name, command-line fragment, DNS name, or IP. The scan matches substrings (case-insensitive) across every session currently stored.
Examples: .env, curl, pastebin, aws secrets, 10.0.0.1
Substring match against file paths, image names, command lines, DNS queries, and network targets across every session reporting into this server.
Type a path, image name, command-line fragment, DNS name, or IP. The scan matches substrings (case-insensitive) across every session currently stored.
Examples: .env, curl, pastebin, aws secrets, 10.0.0.1