sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆220Updated last month
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆313Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 8 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆261Updated 4 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆155Updated 5 months ago
- MISP Playbooks☆205Updated last month
- Docker image for MISP☆132Updated last month
- An index of publicly available and open-source threat detection rulesets.☆119Updated 3 months ago
- Docker image for Velocidex Velociraptor☆130Updated 4 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆172Updated 5 months ago
- Anvilogic Forge☆105Updated last week
- Convert Sigma rules to SIEM queries, directly in your browser.☆92Updated 2 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆324Updated 2 weeks ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆187Updated 10 months ago
- LotL RMM☆221Updated last week
- This is a collection of threat detection rules / rules engines that I have come across.☆293Updated last year
- An opensource sigma conversion tool built using pysigma☆132Updated last month
- A production ready Dockered MISP☆259Updated this week
- ☆93Updated 2 months ago
- Threat Intel Platform for T-POTs☆159Updated 2 weeks ago
- Mapping of open-source detection rules and atomic tests.☆170Updated 6 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆194Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆136Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated this week
- ☆86Updated 4 months ago
- Tools for simulating threats☆190Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Awesome Incident Response☆275Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆96Updated last year