A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆254Apr 7, 2026Updated this week
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆354Updated this week
- ☆10Jan 22, 2025Updated last year
- A command-line tool and module for the free Sublime Analysis API☆16Jun 18, 2024Updated last year
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95Apr 3, 2026Updated last week
- A home for detection content developed by the delivr.to team☆72Aug 10, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Python package and command line utility for scanning emails with YARA rules☆21Jan 23, 2026Updated 2 months ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated 3 weeks ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆523Apr 1, 2026Updated last week
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,232Updated this week
- Collaborative Incident Response platform☆1,458Feb 16, 2026Updated last month
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A repository to share publicly available Velociraptor detection content☆199Mar 29, 2026Updated last week
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Apr 24, 2025Updated 11 months ago
- Galah: An LLM-powered web honeypot.☆644Jul 24, 2025Updated 8 months ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆339Nov 27, 2024Updated last year
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 2 months ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆944Mar 30, 2026Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- A curated list of awesome things related to TheHive & Cortex☆185Oct 9, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 9 months ago
- Threat Intel Platform for T-POTs☆194Apr 3, 2026Updated last week
- Your Everyday Threat Intelligence☆1,967Updated this week
- DFIQ is a collection of investigative questions and the approaches for answering them☆304Mar 10, 2026Updated last month
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆137Jul 19, 2024Updated last year
- Open-source security automation platform for teams and AI agents☆3,544Updated this week
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆395Jan 20, 2026Updated 2 months ago
- ☆2,546Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Threat Hunting & Incident Investigation with Osquery☆217Mar 30, 2022Updated 4 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆114Apr 3, 2026Updated last week
- Collection of example YARA-L rules for use within Google Security Operations☆484Dec 5, 2025Updated 4 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- Detect Tactics, Techniques & Combat Threats☆2,275Jan 21, 2026Updated 2 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆618Dec 8, 2025Updated 4 months ago