This repo contains open-source rules for Sublime, a free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Examples: HTML smuggling VIP / Executive impersonation Malicious OneNote files Malicious LNK files Encrypted zips Community Rule Feeds Delivr To vector-sec amitchell516 Learn more Blog Docs Message Query Language (MQL) reference Release log Follow us on Twitter for updates on new rules and detection capabilities.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
The Upstream Security Platform is a cloud-based solution for monitoring and securing connected vehicles and mobility IoT devices, offering features such as cybersecurity detection, API protection, and fraud detection.
NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.
A security checklist app for your Mac that helps you with basic security hygiene and prevents 80% of problems.
Catch possible phishing domains in near real time by looking for suspicious TLS certificate issuances reported to the Certificate Transparency Log (CTL) via the CertStream API.
Repository for apps to be used in Shuffle with compatibility instructions.
Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.
A tool for quantitative risk analysis of Android applications using machine learning techniques.
Phish Report is inaccessible without JavaScript and cookies enabled.
Python package for processing and analyzing Zeek data with Pandas, scikit-learn, Kafka, and Spark, with offloading capabilities and improved data analysis features.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.