CrowdStrike Falcon Orchestrator is an extendable Windows-based application that provides workflow automation, case management, and security response functionality. The tool leverages the highly extensible APIs contained within the CrowdStrike Falcon Connect program. Support: As an open-source project, this software is not officially supported by CrowdStrike. The project maintainers will be working with active community contributors to address bugs and supply new features. If you have identified a bug, please submit an issue through GitHub by following the contribution guidelines. You can also post questions or start conversations on the project through our community forums page. Getting Started: Please refer to the Wiki page for instructions on installing and configuring the application. You can download the installer through the release page. Development: Being a Windows-based application, the tool was developed with the use of .NET 4.5, C#, ASP.NET MVC 4, Entity Framework.
FEATURES
ALTERNATIVES
Cortex XSOAR is a comprehensive SOAR platform that automates and standardizes security processes for faster response times and increased team productivity.
Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
PowerGRR is a PowerShell module for the GRR API, allowing automation and scripting for incident response and remote live forensics.
An investigative analytics platform that uses machine learning to fuse and analyze data from multiple sources, enabling security organizations to extract insights and identify patterns for threat prevention and complex investigations.
A modular incident response framework in Powershell that uses Powershell Remoting to collect data for incident response and breach hunts.
Web-based tool for incident response with easy local installation using Docker.
Tool to bypass endpoint solutions blocking known 'malicious' signed applications by obtaining valid signed files with different hashes.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.