Sublime Rules Logo

Sublime Rules

0
Free
Visit Website

This repo contains open-source rules for Sublime, a free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Examples: HTML smuggling VIP / Executive impersonation Malicious OneNote files Malicious LNK files Encrypted zips Community Rule Feeds Delivr To vector-sec amitchell516 Learn more Blog Docs Message Query Language (MQL) reference Release log Follow us on Twitter for updates on new rules and detection capabilities.

FEATURES

ALTERNATIVES

A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.

The Upstream Security Platform is a cloud-based solution for monitoring and securing connected vehicles and mobility IoT devices, offering features such as cybersecurity detection, API protection, and fraud detection.

Catch possible phishing domains in near real time by looking for suspicious TLS certificate issuances reported to the Certificate Transparency Log (CTL) via the CertStream API.

Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.

DroidBox is a tool for dynamic analysis of Android applications, providing insights into package behavior and security.

Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.

Verify scripts and executables to mitigate chain of supply attacks.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved