This is an open-source repository of cybersecurity curricular modules for K-12
☆50Jul 18, 2024Updated last year
Alternatives and similar repositories for nebraska-gencyber-modules
Users that are interested in nebraska-gencyber-modules are comparing it to the libraries listed below
Sorting:
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- This repo contains a digitized version of the course content for CYBR8470 Secure Web App Development at the University of Nebraska at Oma…☆17Nov 4, 2024Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Feb 23, 2026Updated 2 weeks ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- ☆97Feb 19, 2024Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Open source application to gain insights into the privacy and security of windows devices.☆14Sep 5, 2024Updated last year
- Balthazar's case and the design. Updates regularly as we progress.☆12Oct 22, 2024Updated last year
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Oct 7, 2020Updated 5 years ago
- Cloud security tutorials and best practices☆38Mar 20, 2023Updated 2 years ago
- ☆38Nov 20, 2025Updated 3 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- Dashboard in Python with automatic updates and email notifications☆10Jun 9, 2022Updated 3 years ago
- Technical Tabletop Exercises Simulation Framework☆48Oct 30, 2023Updated 2 years ago
- Code Snippets & DataSets for Business Analytics & Data Mining/ Machine Learning Algorithms☆15Apr 23, 2018Updated 7 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- Introductory tutorial for Moonshot demonstrating data collection, universe selection, and backtesting of an end-of-day momentum strategy.☆10Feb 7, 2025Updated last year
- Data Science and Business Analytics Task-1 (Predict the percentage of an student based on the no. of study hours)☆10Feb 21, 2022Updated 4 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- ☆10Aug 16, 2022Updated 3 years ago
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- Bugs Framework☆10Updated this week
- Using data from IBM Watson, descriptive and predictive analytics using Python and tableau☆12Dec 23, 2017Updated 8 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated last month
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Mar 5, 2021Updated 5 years ago
- ☆10May 6, 2023Updated 2 years ago
- The electron wrapper of Penpot webapp☆10Sep 16, 2022Updated 3 years ago