optiv / doppelganger
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆14Updated 8 months ago
Alternatives and similar repositories for doppelganger:
Users that are interested in doppelganger are comparing it to the libraries listed below
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆18Updated 3 months ago
- A user enumeration tool for Slack.☆24Updated 9 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- self-hosted Azure OSINT tool☆26Updated 6 months ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated last month
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- Discord C2 Profile for Mythic☆27Updated 3 weeks ago
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 3 months ago
- AutoPoC Generator HoneyPoC☆35Updated 7 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆15Updated 2 weeks ago
- Top hashpwn rules☆18Updated 3 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto …☆38Updated 10 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- A swiss army knife for pentesting networks☆24Updated 2 years ago
- ☆13Updated 2 months ago
- Linux Post-Exploitation tools wrapper☆20Updated last year
- ☆15Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- ☆19Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆37Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated last year
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 10 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year