| Name | Modified | Size | Downloads / Week |
|---|---|---|---|
| irautomation.zip | < 7 hours ago | 3.0 kB | |
| responder.cpython-313.pyc | < 7 hours ago | 1.5 kB | |
| responder.py | < 7 hours ago | 879 Bytes | |
| main.py | < 7 hours ago | 616 Bytes | |
| README.md | < 7 hours ago | 770 Bytes | |
| Totals: 5 Items | 6.7 kB | 0 |
Incident Response Automation Tool
This tool simulates automated defensive actions, such as blocking an IP address on a firewall, in response to detected threats.
Features
- Automated Response: Appends "BLOCK" rules to a simulated firewall configuration file (
firewall_rules.txt). - Audit Logging: Logs the time, action, and reason for every response.
Quick Start
To use this tool, run the responder:
# Block an IP address
python lab_runner.py incident-response --ip 10.10.10.xxx --reason "Malicious Activity Detected"
Output
- Console: Confirms the action taken.
- File (
firewall_rules.txt): Appends a line like:[2024-10-27 12:00:00] ACTION: BLOCK 10.10.10.xxx | REASON: Malicious Activity Detected