usnistgov / MUD-PDLinks
A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files formatted according to the Manufacturer Usage Description specification.
☆25Updated 5 months ago
Alternatives and similar repositories for MUD-PD
Users that are interested in MUD-PD are comparing it to the libraries listed below
Sorting:
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆24Updated 4 years ago
- DefectDojo Documentation☆17Updated 4 years ago
- Repository for various tools around security☆41Updated last year
- Tools for security content automation, baseline tailoring, and overlay development.☆45Updated last year
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16Updated 9 years ago
- A software-defined security orchestration solution☆43Updated 4 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆13Updated 7 years ago
- NIST OSCAL SDK and CLI☆38Updated 5 years ago
- Node.js SDK for IBM X-Force Exchange☆15Updated 7 years ago
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆204Updated this week
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆95Updated last year
- The NIST Open Access to Research (OAR) Public Data Repository (PDR) system software☆14Updated last week
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆17Updated 9 years ago
- OCSP Responder monitor☆37Updated last year
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 8 months ago
- GSA Security Benchmarks and Tools☆21Updated 6 years ago
- Tools to assist in forensicating docker☆85Updated 10 months ago
- A platform built for easy-to-use automated network traffic analysis☆60Updated 3 years ago
- Notes and reference for ongoing forecasting.☆16Updated 3 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 9 years ago
- ☆54Updated 2 weeks ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Verify ownership of domains and mobile apps☆23Updated 2 years ago
- Decrypts Cisco VPN Group Passwords☆18Updated 13 years ago
- Openflow SDN Manufacturer Usage Description (MUD) Server implementation on OpenDaylight Nitrogen Release☆20Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆15Updated 10 months ago