UncleSocks / MeepsLinks
Meeps Security is a gamified cybersecurity training and awareness framework. In the game, players handle incoming calls about cybersecurity incidents, analyze them, and submit the correct threat response within the defined SLA. At the end of the shift, players must correctly resolve at least 80% of the tickets to pass their assessments.
☆30Updated 3 months ago
Alternatives and similar repositories for Meeps
Users that are interested in Meeps are comparing it to the libraries listed below
Sorting:
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆58Updated 5 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆141Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 9 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆80Updated 7 months ago
- Cyber threat intelligence tool suite.☆42Updated 8 months ago
- A series of python scripts to extract information from Dark Web Applications☆13Updated 8 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆108Updated this week
- God Mode Detection Rules☆134Updated last year
- ☆30Updated 2 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 10 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 8 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 5 months ago
- ☆52Updated 3 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Jupyter Notebooks for the Blue Team☆39Updated 10 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last month
- Advanced Bash script designed for conducting digital forensics on Linux systems☆145Updated last year
- IOCs collected during day-to-day activities☆82Updated 2 weeks ago
- Sniffing out well-known threat groups☆64Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- A collection of CVEs weaponized by ransomware operators☆125Updated last month
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆92Updated 6 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆110Updated last year
- COMPLETE OSINT CHEAT-SHEET☆112Updated last month
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆114Updated last year
- Parse and analyze a Windows Amcache.hve registry hive, VirusTotal integration.☆104Updated 3 months ago
- Knowledge base on cybercriminal concealment techniques☆80Updated 7 months ago