optiv / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆16Updated last year
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 7 months ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 5 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- A swiss army knife for pentesting networks☆26Updated 2 years ago
- A user enumeration tool for Slack.☆30Updated last year
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆74Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆17Updated 3 months ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated last month
- Top hashpwn rules☆19Updated 7 months ago
- Script to perform some hashcracking logic automagically☆72Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- ☆140Updated last year
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆55Updated 7 months ago
- Find Inbound Email Domains☆24Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- AutoPoC Generator HoneyPoC☆35Updated 2 months ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆58Updated 3 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 4 months ago
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 4 months ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆21Updated 3 years ago
- ☆41Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- fully async implementation of Dirkjan's ROADTools☆32Updated 4 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year