Repo for Concierge AI dev work
☆197Apr 1, 2026Updated last week
Alternatives and similar repositories for concierge
Users that are interested in concierge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆22Feb 11, 2026Updated 2 months ago
- ☆73Mar 5, 2023Updated 3 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆206Nov 23, 2025Updated 4 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆83May 27, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- A preconfigured Velociraptor triage collector☆76Mar 30, 2026Updated last week
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365…☆64May 12, 2024Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆635Mar 21, 2025Updated last year
- Python code to use different APIs which can help in your OSINT efforts☆27Apr 16, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,942Mar 26, 2026Updated 2 weeks ago
- DShield Sensor Log Collection with ELK☆46Apr 2, 2026Updated last week
- Maltego transforms for Hunchly☆18Jun 9, 2025Updated 10 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆276May 10, 2025Updated 11 months ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 7 months ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.☆743Jun 5, 2025Updated 10 months ago
- ☆53Aug 11, 2024Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Apr 27, 2024Updated last year
- Configuration files for the SOF-ELK VM☆1,728Jan 21, 2026Updated 2 months ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆139Sep 28, 2024Updated last year
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- Example agents for the Dreadnode platform☆30Dec 19, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆66Mar 31, 2026Updated last week
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,493Feb 18, 2026Updated last month
- Purple Team Exercise Framework☆776Updated this week
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- reveal origins behind reverse proxies & hidden services☆37Aug 23, 2025Updated 7 months ago