This is an open-source repository of cybersecurity curricular modules for K-12
☆50Jul 18, 2024Updated last year
Alternatives and similar repositories for nebraska-gencyber-modules
Users that are interested in nebraska-gencyber-modules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16May 4, 2017Updated 8 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Feb 23, 2026Updated last month
- This repo contains a digitized version of the course content for CYBR8470 Secure Web App Development at the University of Nebraska at Oma…☆17Nov 4, 2024Updated last year
- ☆30Nov 15, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- bWAPP Docker image based on raesene/bWAPP and mattrayner/lamp☆12Dec 10, 2019Updated 6 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Jul 23, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Jul 9, 2022Updated 3 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Automatically parse and tabulate Nessus findings into OpenDocument tables☆11Dec 15, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Test of http://www.malwaredomainlist.com/hostslist/hosts.txt☆14Updated this week
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆39Oct 23, 2025Updated 5 months ago
- ☆97Feb 19, 2024Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Cyber Threat Intelligence Feeds☆71May 3, 2024Updated last year
- ☆38Nov 20, 2025Updated 4 months ago
- A collection of scripts to look various things up in VERIS data such as VCDB.☆14Apr 27, 2017Updated 8 years ago
- NIST SP 800-171 OSCAL Content☆17Nov 23, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Technical Tabletop Exercises Simulation Framework☆48Oct 30, 2023Updated 2 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 5 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- Practical Data Wrangling, published by Packt☆18Jan 30, 2023Updated 3 years ago
- PowerShell script and workflow for creating and importing a Win32 package into Intune for the Microsoft 365 Apps☆23Mar 11, 2026Updated 2 weeks ago
- Highly Scalable Enterprise grade ElasticSearch (ELK stake) deployment on Kubernetes Platform☆11Jan 10, 2020Updated 6 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Docker container running cowrie with DShield output enabled.☆17Jun 8, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Repository for SPEED SIEM Use Case Framework☆60May 2, 2020Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Jun 4, 2025Updated 9 months ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆60May 25, 2020Updated 5 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆61Feb 11, 2026Updated last month
- ☆11Aug 11, 2014Updated 11 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago