An0nUD4Y / Evilginx2-PhishletsLinks
Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes
☆760Updated 8 months ago
Alternatives and similar repositories for Evilginx2-Phishlets
Users that are interested in Evilginx2-Phishlets are comparing it to the libraries listed below
Sorting:
- Many Evilginx2 Phishlets Uptodate☆50Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆465Updated 4 months ago
- Open-Source Phishing Toolkit☆240Updated 3 months ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆546Updated 3 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆528Updated last year
- evilginx3 + gophish☆1,883Updated last year
- Ready to go Phishing Platform☆1,062Updated 5 months ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆357Updated last month
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆330Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆425Updated last year
- send Captured Evilginx sessions to Telegram , Mail and Discord☆22Updated 7 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆477Updated last month
- Simple & Powerful PowerShell Script Obfuscator☆581Updated 5 months ago
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆54Updated 2 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆611Updated 5 months ago
- ☆305Updated 2 years ago
- GoPhish Templates that I have retired and/or templates I've recreated.☆194Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆559Updated 5 months ago
- Collection of GoPhish templates available for legitimate usage.☆158Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆152Updated 6 months ago
- AV evading OSX Backdoor and Crypter Framework☆303Updated last month
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆432Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆500Updated 10 months ago
- Generate FUD backdoors☆260Updated 2 years ago
- zerosum0x0's Koadic☆319Updated 3 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,026Updated 11 months ago
- This is a collection of phishing templates and a landing page to be used with goPhish☆431Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆737Updated 2 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,089Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆116Updated 4 years ago