jimi is an orchestration automation tool focusing on multi-team collaboration through an intuitive flow-based interface. It offers unlimited flexibility into all areas of automation from IT/Security operations to Development and CI/CD pipelines. jimi is a cross between a low-code programming language like node red and a no-code SOAR / Automation platform. Built on-top of Python, it has the power and capability to do just about anything, and is expandable, even supporting raw Python code directly within the flows created.
FEATURES
ALTERNATIVES
Workflows for Shuffle automation tool with structured categories and customization options.
CimSweep is a suite of CIM/WMI-based tools for incident response and hunting operations on Windows systems without the need to deploy an agent.
Automated tool for scripting complex sequences in cybersecurity frameworks.
Automated Digital Forensics and Incident Response (DFIR) software for rapid incident response and intrusion investigations.
A public incident response process documentation used at PagerDuty
Cortex XSOAR is a comprehensive SOAR platform that automates and standardizes security processes for faster response times and increased team productivity.
Sample security playbooks for security automation, orchestration and response (SOAR) using Microsoft Sentinel trigger
Detect signed malware and track stolen code-signing certificates using osquery.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.