sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆239Updated 2 weeks ago
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆333Updated last week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆184Updated 9 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆166Updated last month
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆271Updated 8 months ago
- Docker image for MISP☆135Updated this week
- MISP Playbooks☆219Updated last month
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆221Updated last year
- An index of publicly available and open-source threat detection rulesets.☆130Updated 7 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated last week
- LotL RMM☆261Updated last month
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated 3 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆422Updated last week
- An opensource sigma conversion tool built using pysigma☆149Updated last month
- Docker image for Velocidex Velociraptor☆141Updated 8 months ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆291Updated 3 weeks ago
- Awesome Incident Response☆283Updated 2 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆299Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆285Updated last year
- Anvilogic Forge☆112Updated 2 months ago
- ☆99Updated last month
- Rules generated from our investigations.☆203Updated 5 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- A repository of my own Sigma detection rules.☆162Updated this week
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆289Updated last week
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆244Updated 8 months ago
- Cyber Incident Response Team Playbook Battle Cards☆423Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated 2 years ago