sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆228Updated this week
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆324Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated 9 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆157Updated 6 months ago
- Docker image for MISP☆134Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆177Updated 7 months ago
- An opensource sigma conversion tool built using pysigma☆133Updated 2 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆265Updated 5 months ago
- MISP Playbooks☆207Updated 2 months ago
- LotL RMM☆238Updated this week
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆190Updated last year
- Docker image for Velocidex Velociraptor☆132Updated 6 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 2 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆80Updated last week
- Convert Sigma rules to SIEM queries, directly in your browser.☆94Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆230Updated 5 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆113Updated 9 months ago
- ☆94Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- The Sigma command line interface based on pySigma☆158Updated 2 weeks ago
- ☆90Updated last month
- Threat Intel Platform for T-POTs☆161Updated last week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆284Updated last year
- Mapping of open-source detection rules and atomic tests.☆176Updated 7 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆109Updated 11 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆272Updated last week
- ☆87Updated 6 months ago