tweathers-sec / doppelganger_assistantLinks
Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS support.
☆21Updated 7 months ago
Alternatives and similar repositories for doppelganger_assistant
Users that are interested in doppelganger_assistant are comparing it to the libraries listed below
Sorting:
- ☆32Updated last month
- A user enumeration tool for Slack.☆30Updated last year
- fully async implementation of Dirkjan's ROADTools☆32Updated 4 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆19Updated 8 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- Find Inbound Email Domains☆24Updated last year
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆21Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 11 months ago
- ☆41Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- A short scraper looking for a POC of CVE-2024-49112☆15Updated 7 months ago
- ☆17Updated 9 months ago
- tool for identifying guest relationships between companies☆100Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Discord C2 Profile for Mythic☆30Updated 4 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated 8 months ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 4 months ago
- Top hashpwn rules☆19Updated 7 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- Claude MCP server to perform analysis on ROADrecon data☆41Updated 3 months ago
- Passworld is a fully customizable wordlist generator☆15Updated 10 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 4 months ago
- A swiss army knife for pentesting networks☆26Updated 2 years ago
- SMB Audit Tool you were looking for☆21Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆19Updated 3 months ago