Searching...
Searching...
Found 122398 results
jduncan-rva
Automates code formatting and linting fixes using Prettier and ESLint for consistent code style and quality.
jduncan-rva
A utility for connecting to REST APIs, managing authentication flows, and processing responses for seamless integration tasks.
jduncan-rva
Automates conversion of skills between Claude Code and Gemini CLI platforms, enabling seamless cross-platform compatibility and portability for developers.
dandye
Generates timestamped markdown reports for security investigation findings, saving them to the ./reports/ directory for permanent record-keeping.
dandye
Conducts hypothesis-driven threat hunting using threat intelligence, TTPs, and anomaly detection for Tier 3 security analysts, supporting iterative search and documentation.
dandye
Systematically searches SIEM for IOCs (IPs, domains, hashes, URLs) from threat intel, providing enrichment and documentation.
dandye
Automates malware incident response using PICERL methodology, orchestrating triage, containment, eradication, and recovery for endpoint security incidents.
dandye
Proactively detects lateral movement threats using PsExec, WMI, and remote process execution indicators in network environments.
dandye
Searches SIEM for behavioral indicators of credential harvesting using MITRE ATT&CK techniques.
dandye
Explores Global Threat Intelligence (GTI) relationships for an Indicator of Compromise (IOC) to discover connected entities like domains, IPs, and threat actors, expanding security investigations.
dandye
Analyzes suspicious login alerts including impossible travel and untrusted locations by evaluating user history, IP reputation, and login patterns to determine escalation needs.
dandye
Automates phishing incident response via PICERL methodology, analyzing artifacts, identifying compromised users, containing IOCs, and removing malicious emails.
dandye
Investigates and contains account compromise incidents, removes malicious persistence, and restores legitimate access.
dandye
Adds security investigation findings, actions, and recommendations to SOAR cases to maintain audit trails during incident response.
dandye
Provides a confirmation prompt before executing significant actions to prevent accidental operations, ensuring user approval for impactful tasks.
dandye
Orchestrates ransomware incident response via PICERL methodology, covering identification, containment, eradication, and recovery phases.
dandye
Correlates indicators of compromise (IOCs) with existing SIEM alerts and SOAR cases to provide context on past incidents and ongoing investigations.
dandye
Conducts comprehensive threat investigation on critical IOCs with GTI pivoting, deep SIEM analysis, and threat attribution for Tier 2+ security incidents.
dandye
Automates security alert triage by assessing ALERT_ID/CASE_ID, enriching IOCs, and determining if an alert is a false positive or requires escalation.
dandye
Automates end-to-end security alert triage including duplicate checks, IOC enrichment, and classification for false positives, benign true positives, true positives, and suspicious alerts.
dandye
Searches for APT threat actors by analyzing TTPs and IOCs from GTI and SIEM, documenting security findings.
dandye
Analyzes suspected malicious file hashes using GTI reports and behavioral indicators to identify affected systems and recommend containment actions for security incidents.
dandye
Automates SOAR case closure with required documentation including artifact ID, closure reason, and root cause for FP/BTP or completed investigations.
dandye
Checks for duplicate or similar security incidents in SOAR cases to avoid redundant investigations. Takes a CASE_ID and returns similar cases.