sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆234Updated 2 weeks ago
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆131Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆329Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 11 months ago
- An index of publicly available and open-source threat detection rulesets.☆125Updated 6 months ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- MISP Playbooks☆214Updated last week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆182Updated 8 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆267Updated 7 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆252Updated last week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆163Updated 2 weeks ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆219Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆96Updated this week
- Docker image for MISP☆134Updated 2 months ago
- LotL RMM☆248Updated 3 weeks ago
- An opensource sigma conversion tool built using pysigma☆141Updated last week
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆151Updated 3 weeks ago
- ☆87Updated 7 months ago
- Awesome Incident Response☆282Updated 3 weeks ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated 11 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆299Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Anvilogic Forge☆108Updated last month
- ☆96Updated 3 weeks ago
- Docker image for Velocidex Velociraptor☆137Updated 7 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆398Updated 3 weeks ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆83Updated last month
- A standard for reducing log volume without sacrificing analytical capability☆210Updated 8 months ago
- Mapping of open-source detection rules and atomic tests.☆177Updated 9 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated last week
- ☆97Updated 2 months ago