Skip to content

Latest commit

 

History

History
120 lines (71 loc) · 4.17 KB

File metadata and controls

120 lines (71 loc) · 4.17 KB

CyberViser — Customer Outreach Templates

Use these to reach out to MSSPs, pentest firms, SOC teams, and security conferences.


🎯 Template 1 — Cold Email to MSSP / Security Consultancy

Subject: AI that writes your Splunk queries and triage reports — free trial

Hi [Name],

I'm reaching out because [Company] does exactly the kind of work Hancock was built for.

Hancock is an AI security agent (fine-tuned Mistral 7B on MITRE ATT&CK + NVD/CVE) that your team can hit with a single API call and get:

  • Alert triage — severity, MITRE mapping, TP/FP verdict, containment steps
  • SIEM queries — production-ready Splunk SPL / Elastic KQL / Sentinel KQL
  • IR playbooks — full PICERL playbook for any incident type in seconds
  • Pentest mode — recon, exploitation guidance, CVE analysis

It runs on your infra or ours. No data leaves your environment.

I'd love to set you up with a free trial. No pitch, no sales call required — just hit the API and see if it saves your analysts time.

https://0ai-cyberviser.github.io/0ai/

Worth 5 minutes?

— CyberViser cyberviser@proton.me


🎯 Template 2 — LinkedIn DM to Security Professional

Hi [Name], I saw your work on [post/company/CTF] — impressive stuff.

I've been building Hancock, an AI agent fine-tuned specifically for pentest and SOC work. It generates SIEM queries, triages alerts, and writes PICERL playbooks via a simple REST API.

Just shipped v0.4.0. Would love to get your honest feedback — free access, no strings.

https://0ai-cyberviser.github.io/0ai/


🎯 Template 3 — Email to Pentest Firm

Subject: Your analysts shouldn't be writing nmap one-liners from memory

Hi [Name],

Quick question: how much time does your team spend on report writing and CVE research per engagement?

Hancock is an AI built for pentest operators — it knows MITRE ATT&CK, 200k+ CVEs, and can write executive summaries, finding descriptions, and exploitation paths on command.

It's not ChatGPT with a security prompt. It's fine-tuned on real pentest data, deployed as a REST API you can wire into your existing workflow.

Free trial available. Takes 5 minutes to set up.

https://github.com/cyberviser/Hancock/tree/main/docs

— CyberViser | cyberviser@proton.me


🎯 Template 4 — Investor / Accelerator Outreach

Subject: Seed round — AI cybersecurity agent, $217B market

Hi [Name],

I'm building CyberViser — an AI-powered cybersecurity platform that automates the work of pentesters, SOC analysts, and CISOs through specialized LLMs.

Traction:

  • Hancock v0.4.0 shipped — working REST API with 12 security-specific endpoints
  • Fine-tuned Mistral 7B on MITRE ATT&CK, NVD/CVE, and pentest knowledge bases
  • Live website + proprietary IP protection + Docker deployment

Ask: $500K seed to hire 2 ML engineers and scale NIM compute

The full business proposal: https://github.com/cyberviser/Hancock/blob/main/BUSINESS_PROPOSAL.md

Worth a 20-minute call?

— CyberViser | cyberviser@proton.me


🎯 Template 5 — Bug Bounty / CTF Community

Hey [handle],

I know you spend time in the terminal. Built something you might find useful:

Hancock — AI pentest assistant, fine-tuned on MITRE ATT&CK and CVE data. Ask it about recon, exploitation paths, CVEs, or have it write a Splunk hunt query.

Open source core: https://github.com/cyberviser/Hancock Portfolio hub: https://0ai-cyberviser.github.io/0ai/

Star it if it's useful. PRs welcome.


📋 Target List — Who to Contact

High-Value Targets

  • MSSPs (search LinkedIn: "MSSP director" / "SOC manager")
  • Pentest firms (Rapid7, Bishop Fox, NCC Group contractors)
  • Bug bounty hunters (HackerOne, Bugcrowd top hunters)
  • CISO communities (IANS, CISO Forum, LinkedIn CISO groups)
  • Security conference speakers (DEF CON, Black Hat, BSides)

Platforms to Post On

  • Reddit: r/netsec, r/cybersecurity, r/AskNetsec
  • Twitter/X: #infosec #pentesting #blueteam hashtags
  • LinkedIn: Post the v0.1.0 announcement (template above)
  • HackerNews: "Show HN: Hancock — fine-tuned LLM for pentest + SOC"
  • DEF CON CFP: Submit a talk on AI-assisted offensive security