Thiago Mayllart's repositories
DarkMelkor
Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.
Covenant_Alternate
Covenant is a collaborative .NET C2 framework for red teamers.
NightVision
An Extended, Modulair, Host Discovery Framework
Apollo
A .NET Framework 4.0 Windows Agent
clairvoyance
Obtain GraphQL API schema despite disabled introspection!
coffee
A COFF loader made in Rust
DnsRip
DnsRip is a simple .Net component for doing DNS lookups
domainthreat
Daily Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping
eagle-rs
Rusty Rootkit: Windows Kernel Driver in Rust for Red Teamers
EvilClippy
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
GadgetToJScript
A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA based scripts.
LOLDrivers
Living Off The Land Drivers
MiscTools
Miscellaneous Tools
Mythic
A collaborative, multi-platform, red teaming framework
Mythic_C2_Container
PyPi package installed in the Mythic C2 Profile Containers
NET-Obfuscate
Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI
OffensiveCSharp
Collection of Offensive C# Tooling
PackMyPayload
A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX
ProcessInjection
This program is designed to demonstrate various process injection techniques
proxmark3
RRG / Iceman repo - Proxmark3 / Proxmark / RFID / NFC
Pyramid
a tool to help operate in EDRs' blind spots
reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
RedTeamCCode
Red Team C code repo
SharpNamedPipePTH
Pass the Hash to a named pipe for token Impersonation