# sublime-rules **Repository Path**: shellpub/sublime-rules ## Basic Information - **Project Name**: sublime-rules - **Description**: No description available - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2024-12-08 - **Last Updated**: 2024-12-08 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README Sublime Logo Sublime Rules ========== by Sublime Security This repo contains open-source rules for [Sublime](https://github.com/sublime-security/sublime-platform), a free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Examples ---------- - [HTML smuggling](https://github.com/sublime-security/sublime-rules/search?q=html+smuggling) - [VIP / Executive impersonation](https://github.com/search?q=repo%3Asublime-security%2Fsublime-rules+%22vip+impersonation%22&type=code) - [Malicious OneNote files](https://github.com/search?q=repo%3Asublime-security%2Fsublime-rules+%22onenote%22&type=code) - [Malicious LNK files](https://github.com/sublime-security/sublime-rules/blob/main/detection-rules/attachment_lnk_file_with_embedded_content.yml) - [Encrypted zips](https://github.com/sublime-security/sublime-rules/blob/main/detection-rules/attachment_with_encrypted_zip_unsolicited.yml) Community Rule Feeds ---------- - [DelivrTo](https://github.com/delivr-to/detections) - [vector-sec](https://github.com/vector-sec/public-sublime-rules) - [amitchell516](https://github.com/aidenmitchell/custom-sublime-rules) Learn more ---------- - [Blog](https://sublime.security/blog) - [Docs](https://docs.sublimesecurity.com) - [Message Query Language (MQL) reference](https://docs.sublimesecurity.com/docs/message-query-language) - [Release log](https://new.sublimesecurity.com) Follow us on [Twitter](https://twitter.com/sublime_sec) for updates on new rules and detection capabilities.