• Devpost Devpost
    • Log in
    • Sign up
  • Hackathons
  • Projects
  • Host a hackathon
  • Devpost Devpost
  • Hackathons
  • Projects
  • Host a hackathon
  • Log in
  • Sign up

Automation Rising 2020 SOAR Hackathon

Descend
  • Overview
  • Participants (578)
  • Rules
  • Project gallery
  • Updates
  • Discussions
  • Resources
  • Sponsors
Connect with the participants – support your favorite projects by liking, sharing, and commenting on them.

Filter submissions

Sponsor Prizes
Submitter Type
Which category are you entering your playbook into?
If applicable, which sponsor product(s) did you integrate?
Threat Detection Automation in IT OT converged Networks
Threat Detection Automation in IT OT converged Networks

Automating and optimizing an existing threat detection process in an IT OT converged network

Winner Winner
Weranga Kumaradasa
2 0
SlashNext Online Brand Protection Detect & Respond Playbook
SlashNext Online Brand Protection Detect & Respond Playbook

Fully automates the online brand abuse inboxes to detects brand impersonators & malicious URLs using deep inspection & packages required for take down proof (IOCs, forensics, & screenshots)

Winner Winner
Lisa O'Reilly
0 0
SecureHealth
SecureHealth

Next Generation Security Management for the Next Generation of Everywhere Health Devices

Winner Winner
seth piezas
0 0
AWS EC2 - Prisma and XDR
AWS EC2 - Prisma and XDR

Reduce non-compliance with Prisma, EC2 and XDR combination

Winner Winner
Manoj Verma
0 0
1+1 = 3 Supercharging XSOAR with Ansible
1+1 = 3 Supercharging XSOAR with Ansible

XSOAR is the perfect No Code platform for IT Operations...

Winner Winner
Serge Bakharev
1 0
Temp Account Management for External Parties
Temp Account Management for External Parties

Scheduled account creation and deletion on Active Directory using CSV files

Winner Winner
Apple Li
1 0
AWS Security Hub | Starter Pack
AWS Security Hub | Starter Pack

Get up and running faster with this AWS Starter pack. Contains Classifiers and Mappers to get you going. Also contains example playbooks to run through your security incidents from GuardDuty

Winner Winner
Daniel Prince
1 0
AWS EC2 Compromise Response
AWS EC2 Compromise Response

The purpose of this playbook is to define an automated response to Guard Duty alerts indicating malicious traffic either inbound or outbound to an AWS EC2 instance.

Winner Winner
Thomas Burnette
0 0
Chronicle threat hunting
Chronicle threat hunting

Can you detect malicious activities that took place a year ago? How fast?

Winner Winner
Manoj Verma
0 0
Incident Response Pack
Incident Response Pack

This Incident Response Playbook can be used by the SOC teams, who need to extract and enrich domain information, perform reputation checks and take response actions based on the results

Winner Winner
Arpitha Srinivas
1 0
Sixgill stolen domain investigation
Sixgill stolen domain investigation

Attacker buys stolen domain names to fool 'domain age' based intelligence, can you still catch them?

Winner Winner
Manoj Verma Mala Verma Upasana Singh
1 1
Sixgill XSOAR Content Pack
Sixgill XSOAR Content Pack

This XSOAR playbook is configured to run as a time triggered job that periodically adds bad indicators from Sixgill Darkfeed to SIEM blocklist.

Winner Winner
Arpitha Srinivas
1 0
 Cyber Squatting detection with XSOAR
Cyber Squatting detection with XSOAR

Can we detect cyber squatting and phishing domains to protect our employees and customers with help of XSOAR and freeware tools?

Winner Winner
Manoj Verma
0 0
RiskIQ threat hunting
RiskIQ threat hunting

Whois and passive DNS can be really powerful

Winner Winner
Manoj Verma Mala Verma Upasana Singh
1 1
Windows Forensics Using Powershell Remoting
Windows Forensics Using Powershell Remoting

This pack enables you to grab critical forensic evidence from your windows hosts and all of this without having to install any agent and respond in realtime.

Winner Winner
David Baumstien Dean Arbel EliorKedar erezh31
0 0
Tidy
Tidy

Tidy integration handle endpoints environment installation.

Winner Winner
hod Alpert Gal Rabin Eli Sharf Bar Levy
0 0
SASE Automation with Prisma Access
SASE Automation with Prisma Access

Enable Service Providers and Enterprise customers to provision, manage and secure their SASE customers.

Winner Winner
Lookman Kurusumuthu Megha Bindal Matthew Kwong Lior Kolnik
1 0
Detecting brand abuse using CT logs and logo detection
Detecting brand abuse using CT logs and logo detection

This submission monitors newly issued certificates from CT logs for potential phishing campaigns hosted on external (but visually similar) domains using word matching and logo recognition.

Joey Dreijer
2 0
Phishing investigation response using xsoar and Slashnext
Phishing investigation response using xsoar and Slashnext

https://www.youtube.com/watch?v=G0bQiATtEyM

Pramukh Ganeshamurthy
0 0
K8s Policy as Code for CN-Series
K8s Policy as Code for CN-Series

A DevSecOps playbook that automates the synching of Kubernetes Network Policy with CN-Series Security Policy.

Steven Serrata Lior Kolnik Gunjan Patel Sudeep Padiyar + 1
1 0
Insider threat data exfiltration response with XSOAR
Insider threat data exfiltration response with XSOAR

Identify data exfiltration activity from insider threats while speeding investigation and response by providing fast access to file events and metadata across physical and cloud environments.

Pramukh Ganeshamurthy
1 0
SlashNext Automate IR Abuse Inbox Management
SlashNext Automate IR Abuse Inbox Management

Dramatically reduce the time and effort involved in researching suspicious URLs across digital sources with accurate, fully automated, and definitive URL analysis on demand.

Lisa O'Reilly
0 0
Identity Threats Incident Response with XSOAR and Silverfort
Identity Threats Incident Response with XSOAR and Silverfort

Blocking Identity-Based Threats with Silverfort and Palo Alto Networks Cortex XSOAR

Pramukh Ganeshamurthy
1 0
Ransomware Response Pack
Ransomware Response Pack

Efficiently and effectively analyze, prioritize, and remediate potential threats in operational technology (OT) environments, lowering the risk to business-critical facilities and processes.

Pramukh Ganeshamurthy
1 0

1 – 24 of 53

  • «
  • 1
  • 2
  • 3
  • »

Devpost

  • About
  • Careers
  • Contact
  • Help

Hackathons

  • Browse hackathons
  • Explore projects
  • Host a hackathon
  • Hackathon guides

Portfolio

  • Your projects
  • Your hackathons
  • Settings

Connect

  • Twitter
  • Discord
  • Facebook
  • YouTube
© 2023 Devpost, Inc. All rights reserved.
  • Community guidelines
  • Security
  • CA notice
  • Privacy policy
  • Terms of service