CiscoDevNet / MUD-ManagerLinks
Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what sort of access and network functionality they require to properly function
☆23Updated 4 years ago
Alternatives and similar repositories for MUD-Manager
Users that are interested in MUD-Manager are comparing it to the libraries listed below
Sorting:
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 9 months ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last month
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Training scenarios for cyber ranges☆11Updated 5 years ago
- This project provides tools to manage configurations for Cisco devices. Requires PHP5 and MySQL.☆17Updated 4 years ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆19Updated last year
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s …☆30Updated 7 months ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- The RIPE NCC DNS Monitoring Service (DNSMON) provides a comprehensive, objective and up-to-date overview of the quality of the service of…☆30Updated last year
- DevSecOps Guide, located devsecops.pagerduty.com☆13Updated 3 years ago
- Useful scripts I have made for pentests. (nothing pretty)☆9Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 5 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Viproxy (Interactive TCP/TLS proxy forked from em-proxy)☆11Updated 10 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆23Updated 5 years ago
- New version of the buildkit repository☆9Updated 3 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Checklists☆17Updated 8 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Python script that parses a Cisco IOS configuration file and generates a report to efficiently perform an IT Security Audit☆37Updated 6 years ago
- Simple SYSLOG client in Go☆22Updated last month
- A low/zero interaction ssh authentication logging honeypot☆22Updated 11 months ago
- Parse nmap scan data with Perl (official repo)☆36Updated 6 years ago
- Command line utility for parsing certificates☆64Updated 4 years ago