Above: Invisible protocol sniffer for finding vulnerabilities in the network