An open-source security incident response platform that automates and coordinates enterprise defense workflows.
MozDef is an open-source security incident response platform developed by Mozilla to automate and coordinate enterprise defense activities. It processes security events, facilitates real-time collaboration among incident handlers, and integrates with other security tools to streamline threat response. The platform aims to move beyond traditional SIEM systems by providing automated workflows, metrics, and repeatable processes for handling security incidents.
Enterprise security teams, incident responders, and SOC analysts who need to manage high volumes of security events and coordinate defense activities in real-time.
Developers choose MozDef for its ability to automate incident response workflows, provide real-time collaboration features, and process massive event volumes—offering a defender-focused alternative to attacker tool suites with integrated metrics and AWS deployment options.
DEPRECATED - MozDef: Mozilla Enterprise Defense Platform
Capable of processing over 300 million security events daily in production, as verified in Mozilla's environment, making it suitable for large enterprises with massive data loads.
Facilitates immediate coordination among incident handlers, moving beyond traditional SIEMs by integrating workflow automation and information sharing for faster response.
Seeks to automate the security incident handling process and interfaces with other systems like bunker, cymon, and mig, streamlining defense operations and reducing manual effort.
Offers a one-click CloudFormation stack for AWS deployment, reducing setup time and complexity for teams already using AWS infrastructure.
Mozilla has discontinued maintenance, meaning no official updates, security patches, or support, forcing users to fork and maintain the codebase themselves.
Primary deployment is via AWS CloudFormation, which may not suit organizations using other cloud providers or on-premises setups without significant customization effort.
While automation is a goal, integrating with existing security tools and tailoring workflows likely demands extensive configuration, as implied by the need for manual interface setup.
Being deprecated, the project lacks active community development, up-to-date documentation, and third-party integrations compared to actively maintained alternatives.
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Open device management
GRR Rapid Response: remote live forensics for incident response
The Hunting ELK
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.