CiscoDevNet / MUD-Manager
Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what sort of access and network functionality they require to properly function
☆22Updated 3 years ago
Alternatives and similar repositories for MUD-Manager:
Users that are interested in MUD-Manager are comparing it to the libraries listed below
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 4 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Training scenarios for cyber ranges☆11Updated 4 years ago
- ☆11Updated 6 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 11 months ago
- vyos based isolation of networks☆11Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆11Updated 8 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 4 months ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- PowerShell based STIG Scanner.☆11Updated 2 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 3 years ago
- ☆15Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- ☆11Updated 3 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago