Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what sort of access and network functionality they require to properly function
☆25Jul 5, 2021Updated 4 years ago
Alternatives and similar repositories for MUD-Manager
Users that are interested in MUD-Manager are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆25Jul 23, 2025Updated 8 months ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- ☆17May 7, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This is a place for various teamplates and automation resources for Cisco Secure Firewall☆40Sep 30, 2025Updated 6 months ago
- Osmocom SS7 stack, with Shadytel modifications.☆19Aug 2, 2012Updated 13 years ago
- Simple SYSLOG client in Go☆23Jun 5, 2025Updated 10 months ago
- ☆25Dec 10, 2018Updated 7 years ago
- ☆35Sep 9, 2021Updated 4 years ago
- cli_command and cli_config agnostic network automation modules for the network_cli connection plugin☆34Mar 4, 2019Updated 7 years ago
- Repo containing various networking icons including routers, switches, servers, firewalls, load balancers and more. Icons are provided in…☆69Sep 23, 2022Updated 3 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Jul 4, 2017Updated 8 years ago
- ☆31May 24, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- ☆13Feb 12, 2017Updated 9 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- THOR MITRE ATT&CK Framework Coverage☆26Jun 15, 2020Updated 5 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PowerShell Module that converts MSG files to EML files☆11Sep 5, 2019Updated 6 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 6 months ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31Mar 18, 2026Updated last month
- ☆12Feb 16, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- A tool to run a command when the target of a symlink changes☆16Apr 28, 2016Updated 9 years ago
- ☆11Oct 6, 2022Updated 3 years ago
- Automatic hacking tool for URL regexes.☆11Feb 12, 2021Updated 5 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago
- Portability shim for OpenBSD's rpki-client☆68Updated this week