sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆225Updated last week
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆319Updated last week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 9 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆156Updated 6 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- Docker image for MISP☆132Updated last week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆261Updated 5 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆187Updated 11 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆173Updated 6 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆93Updated last week
- LotL RMM☆236Updated last week
- MISP Playbooks☆207Updated 2 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- ☆94Updated 2 weeks ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆283Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆335Updated 2 weeks ago
- Threat Intel Platform for T-POTs☆161Updated this week
- An opensource sigma conversion tool built using pysigma☆133Updated this week
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- The Sigma command line interface based on pySigma☆158Updated last week
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆77Updated last week
- 🏴☠️💰 Another Ransomware gang tracker☆236Updated last week
- A repository of my own Sigma detection rules.☆160Updated 11 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆113Updated 9 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated last week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆108Updated 10 months ago
- Anvilogic Forge☆106Updated last week
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆144Updated last week
- A production ready Dockered MISP☆266Updated 2 weeks ago