CrowdStrike Falcon Orchestrator Logo

CrowdStrike Falcon Orchestrator

0
Free
Visit Website

CrowdStrike Falcon Orchestrator is an extendable Windows-based application that provides workflow automation, case management, and security response functionality. The tool leverages the highly extensible APIs contained within the CrowdStrike Falcon Connect program. Support: As an open-source project, this software is not officially supported by CrowdStrike. The project maintainers will be working with active community contributors to address bugs and supply new features. If you have identified a bug, please submit an issue through GitHub by following the contribution guidelines. You can also post questions or start conversations on the project through our community forums page. Getting Started: Please refer to the Wiki page for instructions on installing and configuring the application. You can download the installer through the release page. Development: Being a Windows-based application, the tool was developed with the use of .NET 4.5, C#, ASP.NET MVC 4, Entity Framework.

FEATURES

ALTERNATIVES

Cortex XSOAR is a comprehensive SOAR platform that automates and standardizes security processes for faster response times and increased team productivity.

Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

PowerGRR is a PowerShell module for the GRR API, allowing automation and scripting for incident response and remote live forensics.

An investigative analytics platform that uses machine learning to fuse and analyze data from multiple sources, enabling security organizations to extract insights and identify patterns for threat prevention and complex investigations.

A modular incident response framework in Powershell that uses Powershell Remoting to collect data for incident response and breach hunts.

Web-based tool for incident response with easy local installation using Docker.

Tool to bypass endpoint solutions blocking known 'malicious' signed applications by obtaining valid signed files with different hashes.

PINNED