sublime-security / sublime-platform
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆187Updated 2 weeks ago
Alternatives and similar repositories for sublime-platform:
Users that are interested in sublime-platform are comparing it to the libraries listed below
- Sublime rules for email attack detection, prevention, and threat hunting.☆285Updated this week
- The Sigma command line interface based on pySigma☆148Updated last month
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆125Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆274Updated this week
- MISP Playbooks☆189Updated last month
- Docker image for Velocidex Velociraptor☆122Updated last month
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 4 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆237Updated 3 weeks ago
- Rules generated from our investigations.☆194Updated 2 weeks ago
- An opensource sigma conversion tool built using pysigma☆122Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated 11 months ago
- LotL RMM☆156Updated 2 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- Docker image for MISP☆125Updated 2 weeks ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆147Updated last month
- 🏴☠️💰 Another Ransomware gang tracker☆189Updated this week
- Repository of attack and defensive information for Business Email Compromise investigations☆250Updated 2 months ago
- ☆87Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.☆72Updated this week
- A repository of my own Sigma detection rules.☆158Updated 7 months ago
- ☆117Updated last year
- God Mode Detection Rules☆134Updated 8 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆110Updated 4 months ago
- ☆83Updated last month
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- A production ready Dockered MISP☆219Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆203Updated this week
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated 3 weeks ago