sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆233Updated 3 weeks ago
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆328Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆130Updated last year
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆160Updated 7 months ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated 10 months ago
- MISP Playbooks☆210Updated 3 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆180Updated 7 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆266Updated 6 months ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- Docker image for MISP☆134Updated last month
- The Sigma command line interface based on pySigma☆159Updated last month
- An index of publicly available and open-source threat detection rulesets.☆125Updated 5 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆83Updated last month
- An opensource sigma conversion tool built using pysigma☆135Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.☆298Updated last year
- LotL RMM☆247Updated this week
- Convert Sigma rules to SIEM queries, directly in your browser.☆95Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆215Updated last year
- ☆87Updated 6 months ago
- Indicators of Compromise☆222Updated this week
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆144Updated this week
- Dettectinator - The Python library to your DeTT&CT YAML files.☆116Updated 5 months ago
- Docker image for Velocidex Velociraptor☆137Updated 6 months ago
- Rules generated from our investigations.☆201Updated 3 months ago
- Anvilogic Forge☆108Updated last week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated 10 months ago
- A production ready Dockered MISP☆281Updated last week
- Mapping of open-source detection rules and atomic tests.☆177Updated 8 months ago
- Zeek-Formatted Threat Intelligence Feeds☆377Updated this week
- ☆96Updated last month
- Cyber Incident Response Team Playbook Battle Cards☆416Updated last year