tweathers-sec / doppelganger
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆15Updated 2 months ago
Alternatives and similar repositories for doppelganger:
Users that are interested in doppelganger are comparing it to the libraries listed below
- bowing to the AI Overlords.☆19Updated last month
- Parses Snaffler output file and generate beautified outputs.☆66Updated this week
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆37Updated 2 years ago
- A public, open source physical security methodology☆44Updated 9 months ago
- Living Off the Foreign Land setup scripts☆64Updated 3 weeks ago
- Efflanrs - GUI for Snaffler Output☆23Updated 4 months ago
- ☆25Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆90Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Updated last year
- Python utility that generates "imageless" QR codes in various formats☆105Updated 5 months ago
- A short scraper looking for a POC of CVE-2024-49112☆14Updated last month
- 🌩️ Collection of BloodHound queries for Azure☆54Updated 3 weeks ago
- A Python POC for CRED1 over SOCKS5☆139Updated 3 months ago
- pysnaffler☆88Updated 3 weeks ago
- ☆54Updated last year
- Custom queries list for BloodHound☆23Updated 5 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆93Updated 3 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆80Updated last month
- Neuviks Terraform Red Team Workshop☆13Updated last month
- Async Python library to parse local and remote disk images.☆77Updated 4 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆101Updated last week
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 8 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆140Updated last month
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 2 years ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- ☆127Updated 7 months ago
- using graph proxy to monitor teams user presence☆52Updated 7 months ago
- Deploy a phishing infrastructure on the fly.☆66Updated last month
- ☆43Updated 6 months ago