MLHale / nebraska-gencyber-modulesView external linksLinks
This is an open-source repository of cybersecurity curricular modules for K-12
☆49Jul 18, 2024Updated last year
Alternatives and similar repositories for nebraska-gencyber-modules
Users that are interested in nebraska-gencyber-modules are comparing it to the libraries listed below
Sorting:
- This repo contains a digitized version of the course content for CYBR8470 Secure Web App Development at the University of Nebraska at Oma…☆17Nov 4, 2024Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Open source application to gain insights into the privacy and security of windows devices.☆14Sep 5, 2024Updated last year
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Oct 7, 2020Updated 5 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Jul 23, 2021Updated 4 years ago
- ☆38Nov 20, 2025Updated 2 months ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- GitHub repo for Bestatic, a simple but really powerful static-site generator, written in Python and Jinja2.☆11Jan 4, 2026Updated last month
- Flatpak builds for Signal, from source☆15Jan 31, 2026Updated 2 weeks ago
- ☆10Aug 16, 2022Updated 3 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 3 weeks ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- Introductory tutorial for Moonshot demonstrating data collection, universe selection, and backtesting of an end-of-day momentum strategy.☆10Feb 7, 2025Updated last year
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated 3 weeks ago
- Using data from IBM Watson, descriptive and predictive analytics using Python and tableau☆12Dec 23, 2017Updated 8 years ago
- A table of open source consoles☆11Feb 24, 2021Updated 4 years ago
- ☆12Feb 16, 2017Updated 8 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Mar 5, 2021Updated 4 years ago
- Customized linux theme.☆10Aug 11, 2022Updated 3 years ago
- ☆10May 6, 2023Updated 2 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 5 years ago
- A Mixture‑of‑Experts Educational Framework for Adaptive Cybersecurity☆19Updated this week
- ☆12Mar 31, 2021Updated 4 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- ☆11Nov 23, 2017Updated 8 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 4 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- ☆15Jul 3, 2025Updated 7 months ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago