sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆244Updated 3 weeks ago
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆340Updated this week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆168Updated last month
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Updated 11 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆276Updated 9 months ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated last year
- LotL RMM☆271Updated last month
- MISP Playbooks☆222Updated 2 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Updated last year
- An opensource sigma conversion tool built using pysigma☆155Updated 2 weeks ago
- A tool that allows you to document and assess any security automation in your SOC☆48Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆298Updated last year
- ☆88Updated 10 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated 3 weeks ago
- Docker image for MISP☆137Updated this week
- An index of publicly available and open-source threat detection rulesets.☆131Updated 8 months ago
- Indicators of Compromise☆246Updated 3 weeks ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆155Updated last month
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆432Updated 3 months ago
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 10 months ago
- Docker image for Velocidex Velociraptor☆142Updated last week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆286Updated last year
- Anvilogic Forge☆113Updated 3 months ago
- A production ready Dockered MISP☆303Updated last week
- Threat Intel Platform for T-POTs☆161Updated this week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated last month
- ☆101Updated last month
- A repository of my own Sigma detection rules.☆163Updated last month
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Updated 2 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆738Updated 11 months ago