Repo for Concierge AI dev work
☆197Apr 23, 2026Updated last week
Alternatives and similar repositories for concierge
Users that are interested in concierge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆22Feb 11, 2026Updated 2 months ago
- ☆73Mar 5, 2023Updated 3 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆209Nov 23, 2025Updated 5 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆84May 27, 2025Updated 11 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Universal Radio Hacker Next Generation (beta): Investigate Wireless Protocols Like A Boss and crack a few remotes☆78Mar 28, 2026Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆15Jul 13, 2023Updated 2 years ago
- A preconfigured Velociraptor triage collector☆76Apr 20, 2026Updated last week
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 3 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365…☆64May 12, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆640Mar 21, 2025Updated last year
- Python code to use different APIs which can help in your OSINT efforts☆27Apr 16, 2024Updated 2 years ago
- DShield Sensor Log Collection with ELK☆47Apr 20, 2026Updated last week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,948Apr 24, 2026Updated last week
- Maltego transforms for Hunchly☆17Jun 9, 2025Updated 10 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆276Apr 19, 2026Updated last week
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 7 months ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A forensics tool to convert the data in the Windows srum (System Resource Usage Monitor) database to an xlsx spreadsheet.☆744Jun 5, 2025Updated 10 months ago
- ☆53Aug 11, 2024Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Apr 27, 2024Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,733Jan 21, 2026Updated 3 months ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆139Sep 28, 2024Updated last year
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆66Apr 20, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,504Feb 18, 2026Updated 2 months ago
- Purple Team Exercise Framework☆782Apr 9, 2026Updated 3 weeks ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- ☆30Jan 13, 2026Updated 3 months ago
- reveal origins behind reverse proxies & hidden services☆37Aug 23, 2025Updated 8 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year