Event JSON
{
"id": "8a9d4c078aeb3005ecb3edc1e02a2d7c58dc426e4f9f51b335c1781c49a4c6cc",
"pubkey": "ff28988482bce651ba73142569db7023862243466ddc5fa5365908af5c389a01",
"created_at": 1700719596,
"kind": 1,
"tags": [
[
"p",
"663e5b600e742d48e847856fab54e01a6dbf6fb710ed4d89ec7d645ad1fe6a9f",
"wss://relay.mostr.pub"
],
[
"p",
"4afb3830f7c5db05d5934438779f63c3ed1401aa03a2eb0cc3cda743633aea61",
"wss://relay.mostr.pub"
],
[
"e",
"91dc5bceb7253598e75425fa0510c49ade490b2a5c3927722977d90ed3b829c9",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/alex_02/statuses/111458359488041836",
"activitypub"
]
],
"content": "nostr:npub1vcl9kcqwwsk536z8s4h6k48qrfkm7mahzrk5mz0v04j94507d20s6hk6t3 Not exactly sure but some of the tools are ngrep, pcredz, zeek, bruteshark, dsniff, etc. Going to also set it up to upload to malcolm.\n\nI thought maybe some ctfs or dfir practice labs might have some pcap files I could use or I could figure out how to generate fake traffic somehow.",
"sig": "f67e4f624f248903ada10e2177da19d507c30bfd93e1725557062b90d6f98cd3e06d5f0faba535c3d7232082682749a7860bd0e1db15b44f936d905dcc19f1e2"
}