Skip to content

7a336e6e/sheetstorm

Repository files navigation

⚡ SheetStorm

Free & Open-Source Incident Response Platform
Track incidents, map attack paths, collaborate in real time, and generate AI-powered reports — all in one place.

MIT License Stars


Why SheetStorm?

Many security teams still coordinate incidents through shared spreadsheets. They're familiar and fast to set up — until concurrent edits collide, context gets lost, audit trails vanish, and there's zero integration with the tools responders actually need.

SheetStorm is a free, open-source alternative purpose-built for DFIR practitioners. It covers the full NIST incident response lifecycle and is designed to be useful whether you're a solo analyst learning the ropes, a training lab instructor, or running an enterprise SOC.

Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned

SheetStorm doesn't aim to replace commercial SOAR platforms. It fills the gap between ad-hoc spreadsheets and heavyweight enterprise tools — giving every responder access to structured, collaborative IR for free.



🔍 Investigate

  • Track compromised hosts, accounts, and IOCs
  • Map MITRE ATT&CK tactics & techniques
  • Import evidence from Excel/CSV spreadsheets
  • Chain of custody for forensic artifacts

🕸️ Visualize

  • Auto-generated attack graphs from incident data
  • 11 node types · 12 edge types · interactive layout
  • Real-time graph sync between team members
  • Export to PNG

🤖 Report

  • AI-powered reports (OpenAI GPT-4 / Google Gemini)
  • Executive, metrics, IOC analysis, and trend reports
  • PDF generation with styled HTML
  • Auto-save to Google Drive case folders

🛡️ Secure

  • 6 RBAC roles with 40+ granular permissions
  • MFA/TOTP with backup codes
  • SSO configuration (SAML/OIDC)
  • Fernet-encrypted credential storage
  • Full audit trail

🔎 Threat Intelligence

  • CVE lookup with CISA KEV + CVSS scoring
  • IP, domain, email reputation lookups
  • Ransomware victim search (ransomware.live)
  • IOC defanging/refanging for safe sharing
  • Auto-enrichment when integrations configured

📚 Knowledge Base

  • LOLBAS — living-off-the-land binaries & scripts
  • 65+ security-relevant Windows Event IDs
  • MITRE D3FEND defensive countermeasures
  • D3FEND ↔ ATT&CK suggestion engine

🤖 MCP Server — AI Assistant Integration

  • 70+ tools across 17 modules for full platform control via natural language
  • Claude, Cursor, and custom AI agents can query incidents, enrich IOCs, build attack graphs, and generate reports
  • SSE transport with OAuth 2.1 authentication and Redis-backed client persistence
  • 5 IR-focused prompt templates (incident analysis, timeline summary, MITRE mapping, lateral movement, executive summary)
  • 5 reference data resources (IR phases, severities, statuses, MITRE tactics & techniques)

Quick Start

git clone https://github.com/7a336e6e/sheetstorm.git && cd sheetstorm
chmod +x start.sh && ./start.sh

That's it. The script generates secrets, builds 6 Docker containers, runs migrations, and seeds an admin user.

Service URL
Proxy http://127.0.0.1:8080
Frontend http://127.0.0.1:3000
API http://127.0.0.1:5000/api/v1
MCP Server http://127.0.0.1:8811/sse

Default login: admin@sheetstorm.local · password in ADMIN_PASSWORD from .env

Requirements

  • Docker & Docker Compose v2
  • 2 GB RAM minimum (4 GB recommended)

Optional Integrations

Configure via environment variables in .env or throught the GUI in the platform:

Integration Purpose
OpenAI / Gemini AI-generated incident reports
VirusTotal IOC and file reputation lookups
MISP Push IOCs to a MISP instance
Google Drive Cloud artifact storage per case
Slack Notification webhooks
S3-compatible External artifact storage backend

Who Is This For?

Use Case How SheetStorm Helps
Solo analyst / student Practice structured IR with a real tool instead of spreadsheets
University / training lab Provide students with a multi-user IR platform at zero cost
Small security team Coordinate response across analysts with real-time collaboration
CTF / red-vs-blue exercises Track blue-team findings with MITRE mapping and kill-chain timelines
Enterprise SOC (lightweight) Quick stand-up for overflow incidents or teams evaluating IR tooling

Documentation

Document Description
Architecture System design, service topology, data flow
API Reference REST endpoint catalogue
WebSocket Events Real-time event reference
Configuration Environment variables and settings
Development Local dev setup, testing, contributing
Roadmap Planned features and milestones
MCP Server MCP integration details

Tech Stack

Layer Technology
Frontend Next.js 14, TypeScript, Tailwind CSS, shadcn/ui, Radix UI, Zustand
Backend Python, Flask 3, SQLAlchemy, Flask-JWT-Extended, Flask-SocketIO
Database PostgreSQL 16, Redis
AI OpenAI GPT-4o, Google Gemini (configurable)
Infra Docker Compose, Nginx reverse proxy
MCP Model Context Protocol server (70+ tools)

Contributing

Contributions are welcome. Please open an issue to discuss significant changes before submitting a PR.

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/your-feature)
  3. Commit your changes
  4. Push and open a Pull Request

License

MIT — free for personal, educational, and commercial use.

About

Track incidents, map attack paths, collaborate in real time, and generate AI-powered reports — all in one place.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors