This is an open-source repository of cybersecurity curricular modules for K-12
☆50Jul 18, 2024Updated last year
Alternatives and similar repositories for nebraska-gencyber-modules
Users that are interested in nebraska-gencyber-modules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16May 4, 2017Updated 8 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Apr 6, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repo contains a digitized version of the course content for CYBR8470 Secure Web App Development at the University of Nebraska at Oma…☆17Nov 4, 2024Updated last year
- ☆30Nov 15, 2018Updated 7 years ago
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆19Nov 7, 2024Updated last year
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Jul 6, 2024Updated last year
- This script is used as a supplement to vulnerability assessment tools such as Nessus, Retina, and various other scanners that are used in…☆19Dec 1, 2017Updated 8 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Jul 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆30Jul 9, 2022Updated 3 years ago
- Open Security Controls Assessment Language Toolbox☆18Feb 4, 2026Updated 2 months ago
- Basic simple integration around falco and wazuh into k8s cluster with daemonset deployment.☆10Jun 16, 2022Updated 3 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Test of http://www.malwaredomainlist.com/hostslist/hosts.txt☆14Updated this week
- ☆98Feb 19, 2024Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Cyber Threat Intelligence Feeds☆72May 3, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆38Nov 20, 2025Updated 4 months ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- A collection of scripts to look various things up in VERIS data such as VCDB.☆14Apr 27, 2017Updated 8 years ago
- NIST SP 800-171 OSCAL Content☆17Nov 23, 2022Updated 3 years ago
- Technical Tabletop Exercises Simulation Framework☆47Oct 30, 2023Updated 2 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 5 years ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆41Oct 23, 2025Updated 5 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Powershell Ransomware☆22Jan 3, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆16Dec 16, 2020Updated 5 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- PowerShell script and workflow for creating and importing a Win32 package into Intune for the Microsoft 365 Apps☆23Mar 11, 2026Updated last month
- Highly Scalable Enterprise grade ElasticSearch (ELK stake) deployment on Kubernetes Platform☆11Jan 10, 2020Updated 6 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆104Dec 13, 2023Updated 2 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Microblog Server☆14Feb 20, 2026Updated last month