All activity
S.I.R.T. generates stack-specific, MITRE ATT&CK-tagged
incident response checklists for L1 SOC analysts.
Select your incident type. Upload your org's security
stack. Get a phase-structured checklist with tool-specific
steps in under 60 seconds.
22 incident types. 60+ tools. 6 IR phases. Two paths:
bring your own API key, or use the free Claude Skill
Bundle; no API key needed.
Free. No account. No data retention. AGPL-3.0.

Security Incident Response TranscriptSIRT makes tool-specific IR checklists to assist SOC analyst
Derick Dmelloleft a comment
Hey Product Hunt 👋 I'm Derick, the maker of S.I.R.T. A bit of context on why I built this: I spent time working in SOC environments and watched many L1 analysts manually Google investigation steps during active incidents. Not because they didn't know what to do - but because "what to do" changes completely depending on which tools your org has. A Splunk query is useless to an analyst running...

Security Incident Response TranscriptSIRT makes tool-specific IR checklists to assist SOC analyst
