Sublime Rules Logo

Sublime Rules

0
Free
Visit Website

This repo contains open-source rules for Sublime, a free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Examples: HTML smuggling VIP / Executive impersonation Malicious OneNote files Malicious LNK files Encrypted zips Community Rule Feeds Delivr To vector-sec amitchell516 Learn more Blog Docs Message Query Language (MQL) reference Release log Follow us on Twitter for updates on new rules and detection capabilities.

FEATURES

ALTERNATIVES

A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.

iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.

Detect and warn about potential malicious behaviors in Android applications through static analysis.

Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.

MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.

A comprehensive checklist for securing Android apps

A novel genetic algorithm for automating censorship evasion strategies.

Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.