optiv / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆16Updated last year
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆20Updated 6 months ago
- Top hashpwn rules☆19Updated 7 months ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Find Inbound Email Domains☆24Updated last year
- ☆17Updated 8 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆25Updated 3 months ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 4 months ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Updated last year
- A swiss army knife for pentesting networks☆26Updated 2 years ago
- ☆31Updated 3 weeks ago
- Bloodhound agent for Mythic☆20Updated 2 months ago
- Hiding your infrastructure from the boys in blue.☆23Updated 3 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- self-hosted Azure OSINT tool☆30Updated 9 months ago
- Discord C2 Profile for Mythic☆29Updated 4 months ago
- ☆13Updated 5 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆17Updated 2 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year