CiscoDevNet / MUD-ManagerLinks
Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what sort of access and network functionality they require to properly function
☆25Updated 4 years ago
Alternatives and similar repositories for MUD-Manager
Users that are interested in MUD-Manager are comparing it to the libraries listed below
Sorting:
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Extract, defang, resolve names and IPs from text☆23Updated 2 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- A Passive DNS backend and collector☆33Updated 3 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Updated 7 months ago
- Ansible role for security standards compliance☆13Updated 6 years ago
- Decrypts Cisco VPN Group Passwords☆18Updated 14 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆33Updated 7 months ago
- Tachikoma is a security alerting framework for human beings☆22Updated 7 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Updated 12 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Updated 4 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 7 years ago
- Development repository for the snort cookbook☆27Updated 3 weeks ago
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆25Updated 6 months ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 3 weeks ago
- The RIPE NCC DNS Monitoring Service (DNSMON) provides a comprehensive, objective and up-to-date overview of the quality of the service of…☆30Updated last year
- Parse nmap scan data with Perl (official repo)☆37Updated 7 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 5 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago
- Simple SYSLOG client in Go☆22Updated 7 months ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16Updated 8 years ago
- Pattern recognition for hosts, services, and content☆14Updated 3 years ago