optiv / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆16Updated last year
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 8 months ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- A swiss army knife for pentesting networks☆26Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 6 months ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- A user enumeration tool for Slack.☆30Updated last year
- Top hashpwn rules☆20Updated 8 months ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆55Updated 8 months ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆21Updated 3 years ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 months ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Script to perform some hashcracking logic automagically☆73Updated last year
- ☆140Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Living Off the Foreign Land setup scripts☆70Updated 5 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- wsnet☆26Updated 3 weeks ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 4 months ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 2 years ago
- tool for identifying guest relationships between companies☆101Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Discord C2 Profile for Mythic☆31Updated 5 months ago