A shell script to automate the setup of Linux router for IoT device traffic analysis and SSL MITM. It looks like it assumes that you're running it on an OpenWRT device (but I could be wrong).
This site focuses on the security of routers. This includes both configuration changes to make a router more secure, and, picking a router that is more secure out of the box.
After some huge router flaws, affecting millions of routers, caught my attention, I started following the topic more closely. As a Defensive Computing guy, I eventually realized that I needed to upgrade my own router security and get more up to speed on the topic. After all, if a router gets infected with malware, or re-configured in a malicious way, most people would never know. There is no anti-virus software for routers.
The Fuzzball is an operating system and a package of applications for the Digital Equipment Corporation (DEC) PDP11 family of computers, including the LSI-11 board-level components. The package was conceived in 1971 as a replacement for the RAMP operating system for the DEC PDP8. It later was evolved as a virtual machine supporting the DEC RT-11 operating system and early developmental versions of the TCP/IP protocol and applications suite. Prototype versions of popular Internet tools, including Telnet, FTP, DNS, EGP and SMTP were first implemented and tested on the Fuzzball. Fuzzball is now in the Computing Dictionary and remembered in the NSF history archives.
Fuzzballs were deployed extensively in the DARPA SATNET program during the 1970s. Fuzzball nests were deployed at the INTELSAT earth stations in the US, UK, Germany, Norway and Italy. Perhaps the best known role of the Fuzzball was as routers for the NSFNET Phase-I Backbone Network, which was deployed during the 1986-1988 time period. There were five routers co-located at the five NSF supercomputer centers and connected by 56-kbps data circuits. The Fuzzballs carried traffic between the centers, the center users and the adjacent college campuses.
A massive online database of default passwords for networking hardware, embedded devices, and operating systems.
A perl script that can retrieve the config files of a variety of network devices for administrative or auditing purposes.
A utility which monitors routers by logging into them, pulling the config files, and comparing them against known-good files to see if anyone's been monkeying with them. Supports Cisco, Juniper, Foundry, Redback, ADC, MRT, Alteon, and HP gear, probably more.