Shuffle Automation is an automation platform designed for accessibility, with key features including community support, documentation, and easy development. Follow Shuffle on Twitter at @shuffleio and explore self-hosted or cloud options for automation. Consider sponsoring the project for rapid development and access resources like blog posts, documentation, and related repositories.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.
Incident response and digital forensics tool for transforming data sources and logs into graphs.
Open-source, free, and scalable cyber threat intelligence and security incident response solution with improved performance and new features.
A public incident response process documentation used at PagerDuty
A panic button app for triggering a ripple effect across apps responding to panic events
TheHive is a case management platform for security operations teams that facilitates incident response, threat analysis, and team collaboration.
CrowdStrike Charlotte AI is a conversational AI assistant that accelerates security operations by automating tasks and providing faster intelligence through generative AI capabilities.
A System for Abuse- and Incident Handling with log file analysis capabilities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.