MuhammadAmas / LMSLinks
This project facilitates easy sign-up and login for both instructors and students. Instructors can efficiently manage courses by creating and deleting them, while students can access learning materials upon logging in to the platform.
☆12Updated 2 years ago
Alternatives and similar repositories for LMS
Users that are interested in LMS are comparing it to the libraries listed below
Sorting:
- Virtual Lab builder and player☆15Updated 4 years ago
- ☆12Updated last week
- ☆25Updated 10 years ago
- suricata rules☆17Updated 9 months ago
- Translate STIX 2 Patterning Queries☆31Updated 7 years ago
- This is the repository which contains code of JDK, JSP, JDBC , Servlet , Spring etc☆10Updated 2 years ago
- This repository is for development of the Unified Cyber Ontology.☆98Updated 4 months ago
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆128Updated 3 months ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 2 months ago
- Open Source Threat Intelligence Platform☆158Updated 2 weeks ago
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆48Updated 2 months ago
- A Virtual Reality platform for interactive, immersive network exploration.☆38Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 10 months ago
- STIX2 graph widget for Jupyter notebooks, powered by stixview library☆23Updated 2 years ago
- Golang library that implements a sigma log rule parser and match engine.☆100Updated last year
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- Structured Threat Intelligence Graph☆97Updated last week
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema logs☆13Updated last month
- Dgraph backup restore tool to/from AWS S3 bucket☆42Updated 4 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆448Updated last year
- ☆62Updated 7 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆35Updated 2 years ago
- Argus Sensor☆71Updated this week
- ☆38Updated 11 months ago
- Beer-ISAC Community Resources☆26Updated 4 years ago
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14Updated 6 years ago
- Swagger/ OpenAPI specifications for security products and services☆77Updated this week
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Updated 11 months ago