InfoSecInnovations / conciergeLinks
Repo for Concierge AI dev work
☆197Updated this week
Alternatives and similar repositories for concierge
Users that are interested in concierge are comparing it to the libraries listed below
Sorting:
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆258Updated 4 months ago
- Tools for simulating threats☆197Updated 2 years ago
- A starter pack of resources to help you get started in Detection Engineering.☆175Updated 3 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated last week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆271Updated 8 months ago
- Conference presentations☆60Updated last month
- ☆38Updated 8 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆291Updated 2 weeks ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆203Updated last week
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆289Updated last week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆285Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆221Updated last year
- A cybersecurity game in Azure Data Explorer☆173Updated last year
- ☆96Updated 3 months ago
- NOVA: The Prompt Pattern Matching☆53Updated last month
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆117Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆269Updated 6 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆69Updated 4 months ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆172Updated 3 weeks ago
- InsightVM helpful SQL queries☆75Updated 9 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆321Updated 2 weeks ago
- LotL RMM☆261Updated last month
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- ☆31Updated 3 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated last week
- Awesome Incident Response☆283Updated 2 months ago
- Knowledge base on cybercriminal concealment techniques☆80Updated 6 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated 2 years ago