optiv / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆15Updated last year
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 2 weeks ago
- Collection of hashcat lists and things.☆52Updated 5 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 8 months ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Script to perform some hashcracking logic automagically☆74Updated 2 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆38Updated 4 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 4 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- A user enumeration tool for Slack.☆31Updated last year
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆21Updated 7 months ago
- ☆141Updated last year
- Deploy a phishing infrastructure on the fly.☆76Updated 10 months ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 7 months ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- wsnet☆26Updated last month
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 7 months ago
- tool for identifying guest relationships between companies☆103Updated last year
- ChatGPT queries via OpenAI API in your terminal☆62Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated last year