optiv / doppelganger
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆14Updated 8 months ago
Alternatives and similar repositories for doppelganger:
Users that are interested in doppelganger are comparing it to the libraries listed below
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆18Updated 2 months ago
- Discord C2 Profile for Mythic☆26Updated this week
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 9 months ago
- Top hashpwn rules☆17Updated 2 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 2 weeks ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 4 months ago
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- A script to automate keystrokes through a graphical desktop program.☆33Updated 3 weeks ago
- self-hosted Azure OSINT tool☆26Updated 5 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆15Updated 9 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- Automatically deploy Nemesis☆20Updated 8 months ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- ☆27Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- ☆20Updated 2 months ago
- Hiding your infrastructure from the boys in blue.☆20Updated 3 years ago
- ☆43Updated 3 weeks ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 11 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 8 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 3 months ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago