optiv / doppelganger
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆16Updated 9 months ago
Alternatives and similar repositories for doppelganger:
Users that are interested in doppelganger are comparing it to the libraries listed below
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆19Updated 3 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- A user enumeration tool for Slack.☆26Updated 9 months ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 2 months ago
- wsnet☆24Updated last week
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆20Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated 9 months ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆35Updated 9 months ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆45Updated 5 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Top hashpwn rules☆18Updated 4 months ago
- ChatGPT queries via OpenAI API in your terminal☆60Updated 2 years ago
- AutoPoC Generator HoneyPoC☆35Updated 8 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated last month
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆14Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 11 months ago
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 3 weeks ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- ☆26Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- ☆13Updated 2 months ago
- Creates and sends fake meeting invite☆58Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 10 months ago