InfoSecInnovations / concierge
Repo for Concierge AI dev work
☆190Updated this week
Alternatives and similar repositories for concierge:
Users that are interested in concierge are comparing it to the libraries listed below
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆110Updated 3 months ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆109Updated this week
- Tools for simulating threats☆181Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆189Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆229Updated last year
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆34Updated last year
- Awesome Incident Response☆267Updated 11 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 4 months ago
- InsightVM helpful SQL queries☆64Updated 3 weeks ago
- Conference presentations☆47Updated last year
- Halberd : Multi-Cloud Attack Platform☆250Updated last week
- A cybersecurity game in Azure Data Explorer☆168Updated 8 months ago
- Intelligence Architecture Mind Map☆125Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆193Updated 8 months ago
- Jupyter Notebooks for the Blue Team☆145Updated 2 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆247Updated last month
- ☆93Updated 2 years ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆172Updated 6 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆144Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆59Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆224Updated 2 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆183Updated 8 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆198Updated 4 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆197Updated 6 months ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆270Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆134Updated 2 weeks ago