A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆259May 14, 2026Updated this week
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆361May 13, 2026Updated last week
- ☆10Jan 22, 2025Updated last year
- A command-line tool and module for the free Sublime Analysis API☆16Jun 18, 2024Updated last year
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95May 11, 2026Updated last week
- A home for detection content developed by the delivr.to team☆73Aug 10, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Python package and command line utility for scanning emails with YARA rules☆23Apr 5, 2026Updated last month
- Collection of generic YARA rules☆16Mar 18, 2026Updated 2 months ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,219Dec 29, 2025Updated 4 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 3 years ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆527May 1, 2026Updated 2 weeks ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,290Updated this week
- Collaborative Incident Response platform☆1,491Apr 28, 2026Updated 3 weeks ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A repository to share publicly available Velociraptor detection content☆203May 10, 2026Updated last week
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆193Apr 24, 2025Updated last year
- Galah: An LLM-powered web honeypot.☆646Jul 24, 2025Updated 9 months ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆340Nov 27, 2024Updated last year
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 4 months ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆958Apr 27, 2026Updated 3 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆61Mar 12, 2022Updated 4 years ago
- A curated list of awesome things related to TheHive & Cortex☆184Oct 9, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 10 months ago
- Threat Intel Platform for T-POTs☆199May 13, 2026Updated last week
- Your Everyday Threat Intelligence☆1,982Updated this week
- DFIQ is a collection of investigative questions and the approaches for answering them☆309Mar 10, 2026Updated 2 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆138Jul 19, 2024Updated last year
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆400Jan 20, 2026Updated 4 months ago
- ☆2,574May 13, 2026Updated last week
- Open-source security automation platform for teams and AI agents☆3,598May 14, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Threat Hunting & Incident Investigation with Osquery☆219Mar 30, 2022Updated 4 years ago
- Collection of example YARA-L rules for use within Google Security Operations☆491Updated this week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59May 13, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,959May 12, 2026Updated last week
- Convert Sigma rules to SIEM queries, directly in your browser.☆115May 14, 2026Updated last week
- Detect Tactics, Techniques & Combat Threats☆2,290Apr 29, 2026Updated 3 weeks ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆629May 9, 2026Updated last week