Sublime rules for email attack detection, prevention, and threat hunting.
☆348Updated this week
Alternatives and similar repositories for sublime-rules
Users that are interested in sublime-rules are comparing it to the libraries listed below
Sorting:
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆247Updated this week
- A command-line tool and module for the free Sublime Analysis API☆16Jun 18, 2024Updated last year
- Anvilogic Forge☆114Sep 18, 2025Updated 5 months ago
- A home for detection content developed by the delivr.to team☆72Aug 10, 2025Updated 6 months ago
- ☆10Jan 22, 2025Updated last year
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95Updated this week
- Elastic Security detection content for Endpoint☆1,377Feb 16, 2026Updated last week
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆804Jan 14, 2026Updated last month
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆612Dec 8, 2025Updated 2 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆638Aug 4, 2025Updated 6 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- A preconfigured Velociraptor triage collector☆76Feb 16, 2026Updated last week
- A repository to share publicly available Velociraptor detection content☆196Feb 22, 2026Updated last week
- ☆2,510Updated this week
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- ☆553Dec 4, 2023Updated 2 years ago
- A Python package and command line utility for scanning emails with YARA rules☆21Jan 23, 2026Updated last month
- A curated list of awesome things related to TheHive & Cortex☆185Oct 9, 2021Updated 4 years ago
- Transform Linux Audit logs for SIEM usage☆812Feb 22, 2026Updated last week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆785Feb 22, 2026Updated last week
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated 11 months ago
- A framework for developing alerting and detection strategies for incident response.☆841Sep 8, 2025Updated 5 months ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,638Feb 22, 2026Updated last week
- Hunting queries and detections☆883Oct 30, 2025Updated 4 months ago
- Documentation and scripts to properly enable Windows event logs.☆672Oct 3, 2025Updated 4 months ago
- Real-time, container-based file scanning at enterprise scale☆975Updated this week
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- Built-in Panther detection rules and policies☆439Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated last month
- An opensource sigma conversion tool built using pysigma☆160Feb 9, 2026Updated 2 weeks ago
- ☆190Feb 8, 2026Updated 2 weeks ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,037Updated this week
- emailrep.io Public API☆352Mar 16, 2024Updated last year
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆773Jan 28, 2025Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,138Dec 19, 2025Updated 2 months ago