CiscoDevNet / MUD-Manager
Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what sort of access and network functionality they require to properly function
☆22Updated 3 years ago
Alternatives and similar repositories for MUD-Manager:
Users that are interested in MUD-Manager are comparing it to the libraries listed below
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Updated 11 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 5 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- ☆11Updated 6 years ago
- ☆18Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- New version of the buildkit repository☆9Updated 2 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- This project provides tools to manage configurations for Cisco devices. Requires PHP5 and MySQL.☆17Updated 3 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- DNS passive monitoring tool☆16Updated 7 years ago
- A tool to run a command when the target of a symlink changes☆16Updated 8 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 4 months ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆19Updated last year