A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆250Mar 10, 2026Updated last week
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆352Updated this week
- ☆10Jan 22, 2025Updated last year
- A command-line tool and module for the free Sublime Analysis API☆16Jun 18, 2024Updated last year
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95Mar 12, 2026Updated last week
- A home for detection content developed by the delivr.to team☆72Aug 10, 2025Updated 7 months ago
- A Python package and command line utility for scanning emails with YARA rules☆21Jan 23, 2026Updated last month
- Collection of generic YARA rules☆16Updated this week
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆25Sep 29, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124May 16, 2023Updated 2 years ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆520Updated this week
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,216Mar 11, 2026Updated last week
- Collaborative Incident Response platform☆1,444Feb 16, 2026Updated last month
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 3 weeks ago
- A repository to share publicly available Velociraptor detection content☆196Updated this week
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Apr 24, 2025Updated 10 months ago
- Galah: An LLM-powered web honeypot.☆639Jul 24, 2025Updated 7 months ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆338Nov 27, 2024Updated last year
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 2 months ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆942Mar 13, 2026Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- A curated list of awesome things related to TheHive & Cortex☆185Oct 9, 2021Updated 4 years ago
- Threat Intel Platform for T-POTs☆188Mar 13, 2026Updated last week
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Your Everyday Threat Intelligence☆1,959Updated this week
- DFIQ is a collection of investigative questions and the approaches for answering them☆301Mar 10, 2026Updated last week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆136Jul 19, 2024Updated last year
- The AI automation platform built for security teams and agents.☆3,530Updated this week
- ☆2,525Updated this week
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆391Jan 20, 2026Updated 2 months ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆477Dec 5, 2025Updated 3 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆113Jan 24, 2026Updated last month
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated 11 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,688Mar 13, 2026Updated last week
- Detect Tactics, Techniques & Combat Threats☆2,268Jan 21, 2026Updated 2 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆613Dec 8, 2025Updated 3 months ago