sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆216Updated last week
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆312Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Updated 7 months ago
- Docker image for Velocidex Velociraptor☆126Updated 3 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆155Updated 4 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆307Updated last week
- Rules generated from our investigations.☆195Updated 2 weeks ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆183Updated 10 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆218Updated 2 months ago
- Tools for simulating threats☆186Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 3 months ago
- An opensource sigma conversion tool built using pysigma☆130Updated last week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆279Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆255Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆114Updated 2 months ago
- Docker image for MISP☆130Updated this week
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- A standard for reducing log volume without sacrificing analytical capability☆205Updated 4 months ago
- Sample programs to access the API☆85Updated last month
- ☆132Updated last month
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆109Updated 2 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆193Updated last year
- ☆118Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆185Updated 9 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆164Updated 4 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year