optiv / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆16Updated last year
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Collection of hashcat lists and things.☆50Updated 5 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆22Updated 8 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Top hashpwn rules☆20Updated 9 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 6 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Updated 11 months ago
- A swiss army knife for pentesting networks☆26Updated 2 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- Yet Another LinkedIn Scraper☆33Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 5 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆25Updated 4 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- tool for identifying guest relationships between companies☆101Updated last year
- Script to perform some hashcracking logic automagically☆73Updated this week
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated 3 weeks ago
- Microsoft365 Device Code Phishing Framework☆38Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 5 months ago
- A user enumeration tool for Slack.☆31Updated last year
- ☆140Updated last year
- Discord C2 Profile for Mythic☆32Updated 6 months ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆37Updated last year
- Living Off the Foreign Land setup scripts☆70Updated 6 months ago
- wsnet☆26Updated last month
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆19Updated 5 months ago