sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆246Updated last week
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆342Updated last week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- MISP Playbooks☆222Updated 3 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆169Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆48Updated last year
- Docker image for MISP☆136Updated 3 weeks ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Updated last year
- An index of publicly available and open-source threat detection rulesets.☆131Updated 9 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated last month
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆278Updated 10 months ago
- Awesome Incident Response☆284Updated 4 months ago
- Anvilogic Forge☆114Updated 4 months ago
- Indicators of Compromise☆247Updated 2 weeks ago
- LotL RMM☆286Updated last week
- ☆88Updated 10 months ago
- An opensource sigma conversion tool built using pysigma☆157Updated 2 weeks ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated 11 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.☆107Updated last week
- Threat Intel Platform for T-POTs☆162Updated this week
- ☆105Updated last month
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆287Updated last year
- Docker image for Velocidex Velociraptor☆145Updated last month
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Updated 2 years ago
- ☆101Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated 2 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆253Updated 10 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆296Updated last week