swiftbird07 / IRIS-SOARLinks
π IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS through playbook automation and seamless integrations. Easily extensible and in active development. Join us in building a tool geared towards enhancing security efficiency!
β11Updated last year
Alternatives and similar repositories for IRIS-SOAR
Users that are interested in IRIS-SOAR are comparing it to the libraries listed below
Sorting:
- Repo for Automations and other solutions for Elastic SIEM/Security.β18Updated 4 years ago
- Workflows for Shuffleβ24Updated 3 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISPβ48Updated 4 months ago
- Collection of Dashboards for Threat Hunting and more!β70Updated 5 years ago
- Incident Response Network Toolsβ24Updated 4 years ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recommanβ¦β11Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysisβ24Updated 9 months ago
- A collection of tips for using MISP.β74Updated 10 months ago
- Threat Simulator for Enterprise Networksβ14Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidentsβ49Updated last year
- A collection of various SIEM rules relating to malware family groups.β70Updated last year
- Open-source Fabric templates for cybersecurity and complianceβ22Updated 9 months ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed featuresβ¦β41Updated 5 years ago
- AIL project training materialsβ37Updated 3 months ago
- β73Updated last year
- The official Prelude SIEM GitHub of https://www.prelude-siem.orgβ33Updated 9 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threaβ¦β18Updated 5 years ago
- β19Updated 3 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β49Updated 2 months ago
- β23Updated 2 months ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.β16Updated 2 months ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortexβ13Updated 5 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packsβ54Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooksβ126Updated 5 years ago
- Sigma detection rules for hunting with the threathunting-keywords projectβ56Updated 7 months ago
- A tool that allows you to document and assess any security automation in your SOCβ47Updated last year
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setupβ¦β15Updated 5 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]β70Updated 4 years ago
- Visualize Microsoft Defender XDR process trees and security eventsβ32Updated 2 months ago
- DNS Dashboard for hunting and identifying beaconingβ16Updated 5 years ago