// soc investigation workflows
Most SOC teams have the tools. What's missing is a consistent process. Structured investigation workflows for phishing, credential dumping, PowerShell, identity compromise, and more.
Pick a workflow → paste into ChatGPT or Claude → get structured output
No signup required·Used by SOC analysts in 10+ countries·Built for real investigations
// how it works
Select the workflow that matches what you're investigating — phishing, PowerShell, identity, network, ransomware, and more.
Each workflow gives you a step-by-step process: what to check, what to decode, and what questions to ask — the same way an experienced analyst would.
Produce a structured SOC summary with severity, MITRE mapping, IOCs, and recommended actions — ready to paste into your ticket or escalate.
// investigation workflows
// faq
SOC.Workflows started from a simple frustration — AI tools are powerful, but most security analysts don't know how to prompt them effectively for real investigation work.
These workflows are different. Each one is structured, step-by-step, and built around real SOC scenarios. Not generic prompts. Not marketing fluff. Just guided inputs that help you investigate faster and document better.
Currently free. Always will be for defenders.
Questions, feedback, or just want to say hello — reach us at gauravkundu12@gmail.com
Stay updated
Get notified when new workflows are added. No spam. Unsubscribe anytime.
Stay updated when new SOC workflows drop. No spam, unsubscribe anytime.