swiftbird07 / IRIS-SOAR
π IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS through playbook automation and seamless integrations. Easily extensible and in active development. Join us in building a tool geared towards enhancing security efficiency!
β10Updated last year
Alternatives and similar repositories for IRIS-SOAR:
Users that are interested in IRIS-SOAR are comparing it to the libraries listed below
- Repo for Automations and other solutions for Elastic SIEM/Security.β18Updated 3 years ago
- Incident Response Report Using GitHub-Sphinxβ20Updated 5 years ago
- Threat Simulator for Enterprise Networksβ14Updated 2 years ago
- Open-source Fabric templates for cybersecurity and complianceβ17Updated 3 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysisβ18Updated 3 months ago
- Incident Response Network Toolsβ24Updated 3 years ago
- Workflows for Shuffleβ21Updated 2 years ago
- A few quick recipes for those that do not have much time during the dayβ22Updated 6 months ago
- This repo contains information on how to auto deploy Sysmon via GPO and Task Schedulerβ12Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidentsβ41Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearchβ70Updated last year
- β16Updated 3 years ago
- Azure AD Incident Responseβ25Updated 3 years ago
- β19Updated 3 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed featuresβ¦β41Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platformβ18Updated 4 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threaβ¦β18Updated 5 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISPβ46Updated last month
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packsβ53Updated last year
- Collection of Dashboards for Threat Hunting and more!β68Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation Systemβ26Updated 4 years ago
- β72Updated 6 months ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.β13Updated 4 years ago
- Bring Your Own Mitre Att&ck Β© Matrix !β13Updated last year
- A collection of tips for using MISP.β74Updated 4 months ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.β32Updated 3 months ago
- β11Updated 4 years ago
- Convert Sigma rules to LogRhythm searchesβ21Updated 3 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.β44Updated 4 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latestβ¦β18Updated 2 months ago