tweathers-sec / doppelgangerLinks
Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of capturing access control card data while performing physical security assessments. Doppelgänger keeps the operator's ease of access, maintenance, and operational communications in mind.
☆20Updated last year
Alternatives and similar repositories for doppelganger
Users that are interested in doppelganger are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated last month
- The CAPTCHA-resilient contact scraper.☆34Updated last year
- Efflanrs - GUI for Snaffler Output☆27Updated last year
- Script to perform some hashcracking logic automagically☆78Updated last week
- Neuviks Terraform Red Team Workshop☆14Updated 3 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆65Updated 8 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated 2 months ago
- pysnaffler☆106Updated 3 months ago
- Living Off the Foreign Land setup scripts☆72Updated 8 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Updated last year
- Python utility that generates "imageless" QR codes in various formats☆131Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 8 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Updated 2 years ago
- A public, open source physical security methodology☆46Updated last year
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆45Updated last year
- ☆40Updated 5 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆33Updated 8 months ago
- Custom queries list for BloodHound☆31Updated 4 months ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆37Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆98Updated last year
- ☆141Updated 2 years ago
- Parses Snaffler output file and generate beautified outputs.☆110Updated 9 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆49Updated 4 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆83Updated 6 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆56Updated 4 months ago
- A short scraper looking for a POC of CVE-2024-49112☆14Updated 11 months ago
- ☆12Updated last year