Repo for Concierge AI dev work
☆197Mar 11, 2026Updated last week
Alternatives and similar repositories for concierge
Users that are interested in concierge are comparing it to the libraries listed below
Sorting:
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆22Feb 11, 2026Updated last month
- ☆73Mar 5, 2023Updated 3 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 3 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆82May 27, 2025Updated 9 months ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- A preconfigured Velociraptor triage collector☆76Mar 2, 2026Updated 2 weeks ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365…☆64May 12, 2024Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆630Mar 21, 2025Updated 11 months ago
- Maltego transforms for Hunchly☆17Jun 9, 2025Updated 9 months ago
- Python code to use different APIs which can help in your OSINT efforts☆27Apr 16, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,931Jan 20, 2026Updated 2 months ago
- DShield Sensor Log Collection with ELK☆46Mar 9, 2026Updated last week
- Repository of attack and defensive information for Business Email Compromise investigations☆276May 10, 2025Updated 10 months ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 6 months ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.☆737Jun 5, 2025Updated 9 months ago
- ☆53Aug 11, 2024Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- Example agents for the Dreadnode platform☆24Dec 19, 2025Updated 3 months ago
- Configuration files for the SOF-ELK VM☆1,723Jan 21, 2026Updated last month
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆138Sep 28, 2024Updated last year
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆66Updated this week
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,488Feb 18, 2026Updated last month
- Purple Team Exercise Framework☆773Jan 4, 2024Updated 2 years ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 6 months ago