sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆247Updated 2 weeks ago
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆345Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- MISP Playbooks☆222Updated 3 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆172Updated 2 months ago
- Docker image for MISP☆136Updated this week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆279Updated 10 months ago
- An index of publicly available and open-source threat detection rulesets.☆131Updated 9 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Updated last year
- LotL RMM☆289Updated last week
- Docker image for Velocidex Velociraptor☆145Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆49Updated last year
- An opensource sigma conversion tool built using pysigma☆157Updated 3 weeks ago
- Indicators of Compromise☆248Updated last week
- ☆101Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.☆109Updated 2 weeks ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 2 weeks ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated 2 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆255Updated 10 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- A standard for reducing log volume without sacrificing analytical capability☆214Updated 11 months ago
- ☆88Updated 11 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated last week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated 2 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆114Updated 3 years ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆435Updated 4 months ago
- Anvilogic Forge☆114Updated 4 months ago