optiv / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆16Updated last year
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆59Updated 10 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Collection of hashcat lists and things.☆51Updated 6 years ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated last week
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆38Updated 4 years ago
- ☆143Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Script to perform some hashcracking logic automagically☆80Updated last month
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆21Updated 4 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- A little cheatsheet for NetExec☆31Updated last year
- Discord C2 Profile for Mythic☆33Updated 10 months ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- A C2 framework built for my bachelors thesis☆54Updated 3 weeks ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆56Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- wsnet☆26Updated 3 months ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 9 months ago
- A user enumeration tool for Slack.☆34Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 9 months ago
- Top hashpwn rules☆20Updated 2 weeks ago
- Federated Office365 user enumeration based on correlated response trend analysis☆52Updated 3 years ago
- Fly into Gophish with One Click (Infra Automation)☆52Updated 2 years ago