CiscoDevNet / MUD-Manager
Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what sort of access and network functionality they require to properly function
☆22Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for MUD-Manager
- Setting up a training environment for MISP☆11Updated last year
- Application and service identification rules for Suricata☆18Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 10 months ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆31Updated last month
- Automate the regular transfer of AIS data into a MISP Server☆6Updated 5 months ago
- A Python-based client for the Cisco openVuln API☆29Updated last year
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- CCIE routing and switching notes and references, with a general directory and specific topic directories.☆22Updated 3 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 6 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆17Updated 7 years ago
- DNS passive monitoring tool☆16Updated 6 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 6 months ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 11 months ago
- ☆18Updated last year
- The project provides an automated deployment procedure for GNS3 server on a Google Compute Engine (GCE) VM instance.☆15Updated 4 years ago
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 7 years ago
- Library and example applications for using/abusing the information-leaky L2Trace service on Cisco switches. PSIRT Advisory: cisco-sa-2019…☆4Updated last year
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆23Updated 5 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 5 years ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆19Updated 8 months ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Decrypts Cisco VPN Group Passwords☆16Updated 12 years ago
- Measuring Internet AS dependency☆12Updated 2 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago