sublime-security / sublime-platformLinks
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
☆212Updated this week
Alternatives and similar repositories for sublime-platform
Users that are interested in sublime-platform are comparing it to the libraries listed below
Sorting:
- Sublime rules for email attack detection, prevention, and threat hunting.☆309Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 10 months ago
- Docker image for MISP☆127Updated last week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 6 months ago
- Docker image for Velocidex Velociraptor☆126Updated 2 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆154Updated 3 months ago
- Rules generated from our investigations.☆195Updated this week
- MISP Playbooks☆201Updated 3 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆253Updated 2 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- An opensource sigma conversion tool built using pysigma☆129Updated 5 months ago
- ☆259Updated 6 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆182Updated 8 months ago
- A standard for reducing log volume without sacrificing analytical capability☆205Updated 3 months ago
- ☆118Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆278Updated last year
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 7 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- ☆91Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- A production ready Dockered MISP☆237Updated 2 weeks ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆80Updated last week
- LotL RMM☆196Updated last week
- An index of publicly available and open-source threat detection rulesets.☆110Updated last month
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆133Updated last year
- ☆141Updated 2 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆253Updated 3 weeks ago
- The Sigma command line interface based on pySigma☆155Updated last month
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆109Updated 2 years ago
- Tools for simulating threats☆185Updated last year