SOAR for humans. Comprehensive IR checklists, tailored to your exact security stack.
Current : v1.1
Live: sirt-five.vercel.app | Skill Bundle: Download v1.0
Level 1 SOC analysts are the first line of defense against security incidents, yet they are often under-equipped for the speed and complexity that real-world triage demands. The gap between "alert fired" and "decision made" is where incidents are mishandled, escalated late, or closed incorrectly.
SOAR platforms solve this for well-resourced organisations through automated playbooks, but a large portion of security teams don't have SOAR. They rely on tribal knowledge, informal runbooks, and analyst intuition: none of which scale, and none of which are consistent.
S.I.R.T. bridges that gap. It produces highly specific, stack-aware, procedural incident response checklists tailored to an organisation's exact security toolset, so that analysts and their internal SOC AI can move faster, investigate more thoroughly, and reach defensible decision points with confidence.
S.I.R.T. does not ingest live data. It does not connect to production systems. It is a procedural intelligence layer; what SOAR does for machines, S.I.R.T. does for humans.
01 Set up your stack → Select your security tools from 60+ options across 9 categories.
Export a portable org-sec-stack.md profile.
02 Select incident type → Choose from 22 incident sub-types across 7 categories.
Select the affected asset type. Enter your LLM API key.
03 Download checklist → Get a phase-structured, MITRE-tagged, tool-specific IR checklist
as a portable .md file, ready for the analyst or their SOC AI.
01 Download skill bundle → Download SIRT-skill-bundle-v1.0.zip from GitHub Releases.
Upload the 4 skill files to a Claude Pro/Team/Enterprise Project.
02 Generate config files → Use the web app to generate your org-sec-stack.md and
incident-type.md. No API key needed for this step.
03 Run in Claude → Upload both files to your Claude Project and type:
"Generate my IR checklist."
| Feature | Detail |
|---|---|
| 22 incident types | 7 categories: Endpoint, Network, Identity, Data, App/Web, Cloud, Social Engineering |
| 60+ security tools | 9 stack categories with mapped public documentation |
| MITRE ATT&CK tagged | Every checklist includes technique references linking to attack.mitre.org |
| Multi-LLM | Anthropic (Claude), OpenAI (GPT-4o), Google (Gemini), Mistral |
| BYOK | Bring your own API key, proxied through Vercel Functions, never stored |
| Claude Skill | No API key path - upload the skill bundle to a Claude Project and run locally |
| Incident Type Generator | Generate a portable incident-type.md session file in under 60 seconds |
| Zero data retention | Nothing persisted server-side. Org profile lives on your machine. Keys clear on tab close. |
| 6 IR phases | Initial Verification → Scope Assessment → Containment → Eradication → Recovery → Reporting |
| Decision points | Minimum 3 explicit ⚠️ DECISION POINT items per checklist |
| Tool query blocks | Real, tool-specific syntax (SPL, KQL, YARA, and more) for every tool in your stack |
| Portable output | Downloads as SIRT-[incident]-[date].md; readable offline, shareable, AI-ingestible |
| Audit folder | Public /audit directory with security hardening documentation |
| Category | Sub-types |
|---|---|
| 🖥️ Endpoint / Host | Malware Execution, Ransomware, Suspicious Process / Code Injection |
| 🌐 Network | DDoS / Volumetric Attack, C2 / Beaconing, Recon / Network Scanning, Lateral Movement |
| 🔑 Identity & Access | Credential Brute Force, Privileged Account Abuse, MFA Bypass / Push Fatigue, Account Takeover |
| 📦 Data | Data Exfiltration, Insider Threat / Data Misuse, Unauthorized Data Access |
| 🌍 Application / Web | Phishing / Spear Phishing, Web Application Attack, Supply Chain Compromise |
| ☁️ Cloud & Infrastructure | Cloud Account Compromise, Misconfiguration / Public Exposure, Container / Kubernetes Threat |
| 🎭 Social Engineering | Business Email Compromise (BEC), Vishing / Smishing |
| Category | Example Tools |
|---|---|
| SIEM | Splunk, Microsoft Sentinel, IBM QRadar, Elastic, Google Chronicle |
| NGFW | Palo Alto PAN-OS, Fortinet FortiGate, Cisco Firepower, Check Point |
| EDR / MDR | CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, Cortex XDR |
| IAM / PAM | Entra ID, Okta, CyberArk, BeyondTrust, HashiCorp Vault |
| Vulnerability Management | Tenable, Qualys, Rapid7 InsightVM, Wiz, Orca |
| NDR / Traffic Analysis | Darktrace, Vectra AI, Zeek, Suricata, Corelight |
| Threat Intelligence | MISP, Recorded Future, OpenCTI, VirusTotal |
| Email Security | Proofpoint, Mimecast, Defender for Office 365, Abnormal Security |
| Cloud Security | AWS Security Hub + GuardDuty, Defender for Cloud, Prisma Cloud |
78 tools across 9 categories. Custom tools can be added at setup.
Every generated checklist (SIRT-[incident-type]-[date].md) contains:
- Header block - org name, incident type, asset type, severity, detection time, timestamp, prompt version
- Incident overview - what this incident type means in context of the affected asset
- MITRE ATT&CK reference block - relevant techniques with direct links
- Procedural checklist - 6 phases, tool-specific steps with query blocks
- Decision points -
⚠️ DECISION POINTcallouts at genuine investigation forks - Escalation criteria - explicit conditions for L2/L3 escalation
See CONTRIBUTING.md.
AGPL-3.0 © 2026 mello-io
S.I.R.T. is free software licensed under the GNU Affero General Public License v3.0. Any modified version deployed as a network service must make its source code publicly available. See LICENSE for full terms.
MITRE ATT&CK® is a registered trademark of The MITRE Corporation.
