CiscoDevNet / MUD-ManagerLinks
Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what sort of access and network functionality they require to properly function
☆23Updated 4 years ago
Alternatives and similar repositories for MUD-Manager
Users that are interested in MUD-Manager are comparing it to the libraries listed below
Sorting:
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 10 months ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Ansible role for security standards compliance☆13Updated 6 years ago
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆24Updated 2 weeks ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- Command line utility for parsing certificates☆65Updated 4 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Updated 3 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Updated 11 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Measuring Internet AS dependency☆12Updated 3 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11Updated 2 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- ISC Forge is an open source DHCP conformance validation framework, primarily used for testing ISC Kea.☆37Updated last week
- Network Tools☆34Updated last year
- Easily Expandable Wireless Intrusion Detection System☆31Updated 4 years ago
- The RIPE NCC DNS Monitoring Service (DNSMON) provides a comprehensive, objective and up-to-date overview of the quality of the service of…☆30Updated last year
- test SSL/TLS clients how secure they are☆24Updated 4 years ago
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆50Updated 4 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago
- Library and example applications for using/abusing the information-leaky L2Trace service on Cisco switches. PSIRT Advisory: cisco-sa-2019…☆3Updated 2 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago