optiv / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆16Updated 11 months ago
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆20Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A user enumeration tool for Slack.☆28Updated 11 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated 2 years ago
- Gadget IoC removal from HAK5's BashBunny☆19Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- self-hosted Azure OSINT tool☆30Updated 8 months ago
- Top hashpwn rules☆19Updated 6 months ago
- A swiss army knife for pentesting networks☆26Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 4 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- Discord C2 Profile for Mythic☆29Updated 3 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 2 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- ☆15Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Find Inbound Email Domains☆24Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 3 months ago