Skip to content

Custom Sublime Sec rules for malicious emails I've come across.

License

Notifications You must be signed in to change notification settings

aidenmitchell/custom-sublime-rules

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

custom-sublime-rules

This repo is a collection of Sublime Security rules that I've developed personally. Most, if not all of these, have been created as a result of emails I've seen in my enviroment that I'd like a rule for.

Rules in development may have a high false positive or false negative rate. Rules in production should be safe.

Please feel free to contribute to this repo, or test these rules in your environment. I don't have a lot of emails to work with, so testing these rules on larger datasets is much appreciated.

Rule inventory

Rule Name In Development In Production Pushed to Sublime repo Comments
Brand impersonation: M365 Mail Notifications Needs to be tested on a larger dataset; improve detection
Brand impersonation: Canada Post False positives unlikely
Impersonation: Employee Benefits Notification Needs to be tested on a larger dataset

About

Custom Sublime Sec rules for malicious emails I've come across.

Topics

Resources

License

Stars

Watchers

Forks