Marius's repositories
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
Autopsy-Plugins
Autopsy Python Plugins
azure-docs
Open source documentation of Microsoft Azure
chainsaw
Rapidly Search and Hunt through Windows Event Logs
CobaltStrikeScan
Scan files or process memory for CobaltStrike beacons and parse their configuration
evtx-hunter
evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Fully-Interactive-Reverse-Shell
Fully Interactive Reverse Shell for both Windows and Linux
INDXParse
Tool suite for inspecting NTFS artifacts.
invoke-atomicredteam
Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team project.
Khepri
🔥🔥🔥Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++, the architecture and usage like Cobalt Strike
mal_unpack
Dynamic unpacker based on PE-sieve
malware-sample-library
Malware sample library.
malware-samples
A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
malware-samples-1
A collection of malware samples caught by several honeypots i manage
MISP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform (formely known as Malware Information Sharing Platform)
misp-modules
Modules for expansion services, import and export in MISP
opencti
Open Cyber Threat Intelligence Platform
python-evtx
Pure Python parser for recent Windows Event Log files (.evtx)
signature-base
Signature base for my scanner tools
surveyor
A simple survey tool for Cb Response and Cb Threat Hunter.
TweetFeed
Collecting IOCs posted on Twitter
velociraptor
Digging Deeper....
xenadmin
XCP-ng Center, the Windows management console for XCP-ng and XenServer. /!\ Community-maintained only /!\
Yara-rules
Collection of private Yara rules.