optiv / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆16Updated last year
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆27Updated last month
- wsnet☆26Updated 4 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- Collection of hashcat lists and things.☆51Updated 6 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 10 months ago
- A user enumeration tool for Slack.☆35Updated last year
- A C2 framework built for my bachelors thesis☆57Updated 3 weeks ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- ☆144Updated 2 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Updated 2 years ago
- ☆42Updated 8 months ago
- Modified version of PEAS client for offensive operations☆42Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 10 months ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Top hashpwn rules☆21Updated last month
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 5 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆42Updated 3 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated last year
- A little cheatsheet for NetExec☆32Updated last year
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago