{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/jhi4JHu4Utw1k7YNKr1g/jrguy34uc3b2ny2S2Vo3/I0Dh7jJ6R.js"],
  "sourcesContent": ["// Generated by Framer (128ce9c)\nexport default function metadata(params,activeLocale){return{breakpoints:[{hash:\"evxe7n\",mediaQuery:\"(min-width: 1600px)\"},{hash:\"a3l10d\",mediaQuery:\"(min-width: 1280px) and (max-width: 1599px)\"},{hash:\"1qg90on\",mediaQuery:\"(min-width: 810px) and (max-width: 1279px)\"},{hash:\"1dsqinp\",mediaQuery:\"(max-width: 809px)\"}],description:\"Strengthen your security posture with threat-led adversary simulations that test tools, teams, and protocols against modern cyber threats.\",elements:{},framerSearch:{index:true},robots:\"max-image-preview:large\",serializationId:\"framer-Ae243\",title:\"Realistic Cyber Attack Simulations & Incident Response Testing | CybrOps\",viewport:\"width=device-width\"};}export const metadataVersion=1;\nexport const __FramerMetadata__ = {\"exports\":{\"metadataVersion\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"default\":{\"type\":\"function\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "AACe,SAARA,EAA0BC,EAAOC,EAAa,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,KAAK,SAAS,WAAW,qBAAqB,EAAE,CAAC,KAAK,SAAS,WAAW,6CAA6C,EAAE,CAAC,KAAK,UAAU,WAAW,4CAA4C,EAAE,CAAC,KAAK,UAAU,WAAW,oBAAoB,CAAC,EAAE,YAAY,6IAA6I,SAAS,CAAC,EAAE,aAAa,CAAC,MAAM,EAAI,EAAE,OAAO,0BAA0B,gBAAgB,eAAe,MAAM,2EAA2E,SAAS,oBAAoB,CAAE,CAAQ,IAAMC,EAAgB,EAC/rBC,EAAqB,CAAC,QAAU,CAAC,gBAAkB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,QAAU,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["metadata", "params", "activeLocale", "metadataVersion", "__FramerMetadata__"]
}
