SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incident response. It enriches alerts using VirusTotal & AbuseIPDB, creates incidents in TheHive, and sends real-time Discord notifications.
☆131Feb 21, 2025Updated last year
Alternatives and similar repositories for SOAR-Flow
Users that are interested in SOAR-Flow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 28, 2026Updated last month
- Security Monitoring using Wazuh, published by Packt☆44Apr 22, 2026Updated 3 weeks ago
- ☆43Dec 24, 2024Updated last year
- A walkthrough of creating and using the Azure environment and Microsoft Sentinel to track attacks and plot attacks on a live map.☆24Mar 26, 2023Updated 3 years ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated last year
- ☆47Jul 9, 2024Updated last year
- CSF Firewall and AbuseIPDB API integration with specific focus on data privacy and prevention of sensitive data leaked to public AbuseIPD…☆17Mar 20, 2024Updated 2 years ago
- This repository contains steps on how i set up a basic home lab running Active Directory.☆38Apr 2, 2023Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Jul 27, 2020Updated 5 years ago
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 10 months ago
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆33Apr 2, 2025Updated last year
- Pentest automation resources for Burp☆15Mar 10, 2024Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A curated list of awesome appsec tools available on Ubuntu 🗄️☆12Mar 4, 2024Updated 2 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆35Jul 23, 2024Updated last year
- A Node.js script that automates the reporting of malicious IP addresses detected by Cloudflare WAF to AbuseIPDB ☁️🕵️☆41May 14, 2026Updated last week
- INE eCPPTv3 Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eCPPTv3 cours…☆71Aug 24, 2025Updated 8 months ago
- ☆20Apr 10, 2025Updated last year
- Playbooks for SOC Analysts☆716Dec 11, 2022Updated 3 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- ☆24May 22, 2024Updated 2 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,071Oct 5, 2023Updated 2 years ago
- PowerShell-Integrity-FIM☆13Jan 17, 2024Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- ☆16Apr 10, 2025Updated last year
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆26Aug 29, 2021Updated 4 years ago
- ☆21Apr 19, 2024Updated 2 years ago
- Setting up Active Directory with an Ansible Playbook and create some groups and users☆17Jun 9, 2023Updated 2 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 10 months ago
- In this projects are custom-decoders and custom-rules for Wazuh by me. Feel free to use it, you can redistribute it and/or modify it unde…☆63Mar 7, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- VulnReach builds on standard SCA output by adding reachability context - proving through static analysis, taint tracking, and live runtim…☆20Apr 27, 2026Updated 3 weeks ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆59Jun 7, 2022Updated 3 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 3 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆21Mar 27, 2024Updated 2 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated 2 years ago