tweathers-sec / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆17Updated 6 months ago
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆20Updated 6 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆15Updated last month
- bowing to the AI Overlords.☆24Updated 5 months ago
- The CAPTCHA-resilient contact scraper.☆17Updated 8 months ago
- Find Inbound Email Domains☆24Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆37Updated 4 months ago
- ☆12Updated 7 months ago
- Custom queries list for BloodHound☆28Updated 9 months ago
- Efflanrs - GUI for Snaffler Output☆26Updated 8 months ago
- ☆31Updated last week
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆47Updated 2 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- A public, open source physical security methodology☆46Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated 2 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- A user enumeration tool for Slack.☆28Updated 11 months ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆33Updated last year
- Neuviks Terraform Red Team Workshop☆13Updated 5 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 6 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12Updated 4 years ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 2 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- ☆44Updated 11 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆94Updated 2 years ago
- ☆20Updated 5 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆73Updated last year
- Living Off the Foreign Land setup scripts☆70Updated 3 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆39Updated 3 months ago
- Scripts that automate portions of pentests.☆50Updated last month