swiftbird07 / IRIS-SOARLinks
🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS through playbook automation and seamless integrations. Easily extensible and in active development. Join us in building a tool geared towards enhancing security efficiency!
☆11Updated last year
Alternatives and similar repositories for IRIS-SOAR
Users that are interested in IRIS-SOAR are comparing it to the libraries listed below
Sorting:
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 4 months ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Collection of Dashboards for Threat Hunting and more!☆70Updated 4 years ago
- AIL project training materials☆35Updated 2 months ago
- Workflows for Shuffle☆23Updated 2 years ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Updated 2 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆54Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆74Updated 3 weeks ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 8 months ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago
- A collection of tips for using MISP.☆74Updated 9 months ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Updated last year
- Incident Response Network Tools☆24Updated 4 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆30Updated 2 weeks ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 4 years ago
- ☆73Updated 11 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Open-source Fabric templates for cybersecurity and compliance☆22Updated 8 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 7 months ago
- Cyber Threat Intelligence Appliance☆13Updated 2 years ago
- Corelight@Home script☆44Updated 2 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 5 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 9 months ago