Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders. Aurora brings 'Spreadsheet of Doom' used in the SANS FOR508 class to the next level. It's intended to be used in small and big incident response investigations to track findings, tasks, making reporting easy and generally stay on top of the game. The current version has been battle tested multiple times now.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.
A Sysmon configuration file template with detailed explanations and tutorial-like features.
A comprehensive auditd configuration for Linux systems following best practices.
A set of scripts for collecting forensic data from Windows and Unix systems respecting the order of volatility.
A cybersecurity and privacy playbook management platform that enables teams to create, store, share, and implement standardized security procedures through a no-code interface.
A robust and flexible hunt and incident response tool for investigating AzureAD, Azure, and M365 environments.
An open-source SOAR tool for automating threat and incident response workflows using CACAO security playbooks.
Automate security incident handling and facilitate real-time activities of incident handlers.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.