sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆218Updated last month
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆313Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 7 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- Docker image for MISP☆132Updated 3 weeks ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆155Updated 4 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 8 months ago
- MISP Playbooks☆206Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆317Updated this week
- An index of publicly available and open-source threat detection rulesets.☆116Updated 2 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆170Updated 5 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆186Updated 10 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆260Updated 3 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆91Updated this week
- Docker image for Velocidex Velociraptor☆128Updated 4 months ago
- An opensource sigma conversion tool built using pysigma☆131Updated 3 weeks ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated 2 weeks ago
- 🏴☠️💰 Another Ransomware gang tracker☆220Updated this week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆282Updated last year
- ☆92Updated last month
- A production ready Dockered MISP☆255Updated 2 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated last week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year
- Rules generated from our investigations.☆196Updated 3 weeks ago
- LotL RMM☆217Updated 3 weeks ago
- Anvilogic Forge☆104Updated last week
- ☆262Updated 7 months ago
- Awesome Incident Response☆275Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆164Updated 4 months ago