☆10Jan 22, 2025Updated last year
Alternatives and similar repositories for public-sublime-rules
Users that are interested in public-sublime-rules are comparing it to the libraries listed below
Sorting:
- A command-line tool and module for the free Sublime Analysis API☆16Jun 18, 2024Updated last year
- A home for detection content developed by the delivr.to team☆72Aug 10, 2025Updated 6 months ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- A Python package and command line utility for scanning emails with YARA rules☆21Jan 23, 2026Updated last month
- Automate your SOC with SEKOIA.IO's Automation Library. Pull Requests are always welcome and highly appreciated!☆21Updated this week
- Python3 interface for the EmailRep API☆55Jan 22, 2021Updated 5 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Aug 29, 2021Updated 4 years ago
- PSEmailRep is a simple PowerShell module to interface with the EmailRep.io API.☆27Oct 14, 2020Updated 5 years ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆348Updated this week
- ☆11Feb 6, 2026Updated 3 weeks ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆35Feb 1, 2022Updated 4 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95Updated this week
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Save as PDF addon for Firefox and Google Chrome☆15Jun 12, 2025Updated 8 months ago
- Static analysis tool to Identify and Fix GitHub Actions prone to Supply‑Chain Risks☆14Dec 24, 2025Updated 2 months ago
- ☆42Sep 16, 2022Updated 3 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Collect AWS logs and query them instantly with SQL! Open source CLI. No DB required.☆16Feb 10, 2026Updated 2 weeks ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- 🐧 Security-focused Linux distribution with 140+ tools, custom kernel 6.17.13, AI assistant | 5 editions | Cloud, AI/ML, Automotive, Hard…☆29Updated this week
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- ☆11Nov 8, 2023Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 2 weeks ago
- ☆13Dec 14, 2021Updated 4 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago