optiv / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆16Updated last year
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆23Updated 9 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Collection of hashcat lists and things.☆51Updated 5 years ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- Script to perform some hashcracking logic automagically☆75Updated last month
- A user enumeration tool for Slack.☆31Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 7 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- AutoPoC Generator HoneyPoC☆35Updated 5 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- Discord C2 Profile for Mythic☆32Updated 7 months ago
- wsnet☆26Updated this week
- Top hashpwn rules☆21Updated 10 months ago
- ☆35Updated 3 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆55Updated 10 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆19Updated 6 months ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 3 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- ChatGPT queries via OpenAI API in your terminal☆62Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆38Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 6 months ago
- exfiltration/infiltration toolkit☆24Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 6 months ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago