CiscoDevNet / MUD-ManagerLinks
Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what sort of access and network functionality they require to properly function
☆23Updated 4 years ago
Alternatives and similar repositories for MUD-Manager
Users that are interested in MUD-Manager are comparing it to the libraries listed below
Sorting:
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Ansible role for security standards compliance☆13Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- A modern CLI for Tenable.io written in Go☆14Updated 4 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆87Updated 6 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆31Updated 7 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆61Updated 8 years ago
- Development repository for the snort cookbook☆27Updated last week
- Minimalistic DNS logging tool☆44Updated 3 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆50Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆21Updated 8 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 5 months ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 6 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated last year
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆12Updated 4 years ago
- Command line utility for parsing certificates☆66Updated 4 years ago
- Docker container for datasploit framework☆26Updated 8 years ago