A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
☆484Nov 15, 2024Updated last year
Alternatives and similar repositories for Meerkat
Users that are interested in Meerkat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆506Oct 21, 2022Updated 3 years ago
- Tony's collection of powershell scripts, typically geared toward cybersec☆35Apr 2, 2026Updated last week
- Invoke-LiveResponse☆150Feb 22, 2022Updated 4 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,432Nov 16, 2023Updated 2 years ago
- SIEM Tactics, Techiques, and Procedures☆707Apr 8, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- Powershell Threat Hunting Module☆290Sep 21, 2016Updated 9 years ago
- A Powershell incident response framework☆1,643Nov 22, 2022Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Powershell-based Windows Security Auditing Toolbox☆574Jan 9, 2019Updated 7 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆939Dec 12, 2023Updated 2 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,344Dec 13, 2022Updated 3 years ago
- Digital forensic acquisition tool for Windows based incident response.☆346May 7, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Aug 1, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- CyLR - Live Response Collection Tool☆722Jun 1, 2022Updated 3 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆489Feb 21, 2021Updated 5 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,153Oct 19, 2025Updated 5 months ago
- Fast incident overview☆41Feb 11, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- DFIRTrack - The Incident Response Tracking Application☆533Jan 13, 2026Updated 3 months ago
- Utilities for Sysmon☆1,636Apr 4, 2026Updated last week
- Splunk code (SPL) for serious threat hunters and detection engineers.☆292Jan 15, 2024Updated 2 years ago
- Loki - Simple IOC and YARA Scanner☆3,742Jan 12, 2026Updated 3 months ago
- An information security preparedness tool to do adversarial simulation.☆1,136Apr 1, 2019Updated 7 years ago
- Windows Live Artifacts Acquisition Script☆191Jun 20, 2022Updated 3 years ago
- Windows Events Attack Samples☆2,541Jan 24, 2023Updated 3 years ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- Configuration files for the SOF-ELK VM☆1,729Jan 21, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Run PowerShell command without invoking powershell.exe☆1,541Mar 23, 2023Updated 3 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,939Jul 6, 2024Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆1,860Nov 17, 2021Updated 4 years ago
- FAME Automates Malware Evaluation☆936Dec 16, 2025Updated 3 months ago
- A repository of sysmon configuration modules☆3,016Aug 21, 2024Updated last year
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago