Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what sort of access and network functionality they require to properly function
☆26Jul 5, 2021Updated 4 years ago
Alternatives and similar repositories for MUD-Manager
Users that are interested in MUD-Manager are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆25Jul 23, 2025Updated 9 months ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 12 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- ☆17May 7, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Cisco Webex Endpoint Websocket Monitor☆14Jun 7, 2021Updated 4 years ago
- Resources for O'Reilly's Python Next Steps: Lists, Tuples, Dictionaries, & Sets☆18Sep 18, 2020Updated 5 years ago
- The NIST BGP Secure Routing Extension (BGP-SRx) is an open source reference implementation and research platform for investigating emergi…☆37Sep 29, 2024Updated last year
- This is a place for various teamplates and automation resources for Cisco Secure Firewall☆41Sep 30, 2025Updated 7 months ago
- Osmocom SS7 stack, with Shadytel modifications.☆20Aug 2, 2012Updated 13 years ago
- ☆25Dec 10, 2018Updated 7 years ago
- cli_command and cli_config agnostic network automation modules for the network_cli connection plugin☆34Mar 4, 2019Updated 7 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Jul 4, 2017Updated 8 years ago
- ☆31May 24, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Still in dev mode☆12Apr 24, 2018Updated 8 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- ☆13Feb 12, 2017Updated 9 years ago
- THOR MITRE ATT&CK Framework Coverage☆26Jun 15, 2020Updated 5 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Dec 14, 2025Updated 4 months ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- PowerShell Module that converts MSG files to EML files☆11Sep 5, 2019Updated 6 years ago
- An tiny linux kernel with initramfs for Qemu based on Mitch Galgs linux tutorials.☆13Apr 13, 2026Updated 3 weeks ago
- ☆10May 29, 2023Updated 2 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- A tool to run a command when the target of a symlink changes☆16Apr 28, 2016Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Oct 6, 2022Updated 3 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Portability shim for OpenBSD's rpki-client☆68Updated this week
- Node streams2 layer for working with WebRTC data channels☆16Oct 29, 2019Updated 6 years ago
- Collection of port scans of the North Korean IPv4 subnets from different vps☆17Nov 25, 2025Updated 5 months ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago