executing-diamond-model-analysis
mukul975/Anthropic-Cybersecurity-Skills
Structures completed intrusion investigations with the Diamond Model by documenting adversaries, capabilities, infrastructure, and victims plus their relationships, metadata, and pivots to cluster incidents and support campaign attribution, confidence scoring, and analytic write-ups.