Meeps Security is a gamified cybersecurity training and awareness framework. In the game, players handle incoming calls about cybersecurity incidents, analyze them, and submit the correct threat response within the defined SLA. At the end of the shift, players must correctly resolve at least 80% of the tickets to pass their assessments.
☆34Aug 29, 2025Updated 8 months ago
Alternatives and similar repositories for Meeps
Users that are interested in Meeps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ONYX: Cisco Automated Assessment and Auditing Tool (CAAAT). An open-source tool that automatically assesses and audits Cisco IOS routers …☆21May 6, 2025Updated 11 months ago
- Content Security Policy Generator, Powered by RapidSec☆16Feb 28, 2021Updated 5 years ago
- ☆20Feb 25, 2025Updated last year
- Decryption utility for PGP Whole Disk Encryption☆20Aug 27, 2021Updated 4 years ago
- Hack. Sleep. Repeat☆22Oct 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Oct 18, 2024Updated last year
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Copyasta Halu Untuk Yang Mau Melepas Stres.☆12Mar 26, 2026Updated last month
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Jul 10, 2018Updated 7 years ago
- You know, an awesome list of search engines.☆30Jul 18, 2025Updated 9 months ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- 🟩 NanoMC – A lightweight, portable Minecraft 1.8.9 build under 300MB. Runs anywhere, no install required.☆12Mar 23, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This is a webshell open source project☆10Oct 7, 2016Updated 9 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆18Feb 22, 2024Updated 2 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- A curated list of full text search engines and stuff related with it.☆20Feb 21, 2021Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- osu! External ASIO Sound Player☆12Dec 3, 2022Updated 3 years ago
- Nexus of Android banking Trojans☆14Oct 11, 2023Updated 2 years ago
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Jan 22, 2023Updated 3 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- NSA Grade Spy tool for Discord☆15Aug 6, 2021Updated 4 years ago
- Trend Micro XDR/Vision One Hunting Recipies☆19Apr 7, 2021Updated 5 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Modern PIC implant for Windows (64 & 32 bit)☆107Jul 23, 2025Updated 9 months ago
- Just another useless C2 occupying space in some HDD somewhere.☆22Jul 4, 2023Updated 2 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆52Sep 17, 2020Updated 5 years ago
- The intake formats supported by SEKOIA.IO☆21Updated this week
- ☆16Sep 6, 2017Updated 8 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 6 months ago