optiv / doppelganger
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆13Updated 3 months ago
Related projects: ⓘ
- A framework for OAuth 2.0 device code authentication grant flow phishing☆33Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆12Updated last month
- Discord C2 Profile for Mythic☆23Updated 5 months ago
- AutoPoC Generator HoneyPoC☆32Updated 2 months ago
- ☆34Updated 4 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆57Updated 9 months ago
- Collection of hashcat lists and things.☆50Updated 4 years ago
- ☆13Updated 2 weeks ago
- ☆77Updated 5 months ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆32Updated 9 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 3 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆49Updated 5 months ago
- Next generation fireprox AWS API endpoint creation utility.☆41Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆34Updated 4 months ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆35Updated last week
- A script to automate keystrokes through a graphical desktop program.☆33Updated 2 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 2 months ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆63Updated 3 months ago
- ☆30Updated this week
- Small project to facilitate creation of .lnk payloads☆60Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆37Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆33Updated 3 years ago
- Modular framework to exploit UPS devices☆61Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆72Updated 3 months ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆18Updated 9 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆26Updated 5 months ago