UncleSocks / MeepsLinks
Meeps Security is a gamified cybersecurity training and awareness framework. In the game, players handle incoming calls about cybersecurity incidents, analyze them, and submit the correct threat response within the defined SLA. At the end of the shift, players must correctly resolve at least 80% of the tickets to pass their assessments.
☆32Updated 5 months ago
Alternatives and similar repositories for Meeps
Users that are interested in Meeps are comparing it to the libraries listed below
Sorting:
- Sniffing out well-known threat groups☆64Updated last year
- Jupyter Notebooks for the Blue Team☆39Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 11 months ago
- ☆52Updated 5 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 11 months ago
- ☆30Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆120Updated last week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago
- God Mode Detection Rules☆135Updated last year
- IOCs collected during day-to-day activities☆103Updated this week
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 3 weeks ago
- A collection of CVEs weaponized by ransomware operators☆129Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Updated 9 months ago
- A series of python scripts to extract information from Dark Web Applications☆13Updated 10 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆126Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Updated 2 months ago
- Creation of a laboratory for malware analysis in AWS☆105Updated 3 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 3 years ago
- ☆74Updated 2 weeks ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 3 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 4 months ago
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago