UncleSocks / MeepsLinks
Meeps Security is a gamified cybersecurity training and awareness framework. In the game, players handle incoming calls about cybersecurity incidents, analyze them, and submit the correct threat response within the defined SLA. At the end of the shift, players must correctly resolve at least 80% of the tickets to pass their assessments.
☆34Updated 5 months ago
Alternatives and similar repositories for Meeps
Users that are interested in Meeps are comparing it to the libraries listed below
Sorting:
- Sniffing out well-known threat groups☆64Updated last year
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17Updated 8 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 11 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆39Updated last year
- God Mode Detection Rules☆135Updated last year
- MCP server for Atomic Red Team☆105Updated last week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 11 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- Collection of videos of Raids on Cybercriminals☆21Updated 10 months ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆20Updated 9 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 3 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- A series of python scripts to extract information from Dark Web Applications☆13Updated 10 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Knowledge base on cybercriminal concealment techniques☆92Updated 9 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 10 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 7 months ago
- A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analy…☆44Updated 6 months ago
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 3 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆63Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆57Updated 2 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Updated last year
- IOCs collected during day-to-day activities☆104Updated last week