An0nUD4Y / Evilginx2-Phishlets
Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes
☆534Updated last month
Related projects: ⓘ
- Many Evilginx2 Phishlets Uptodate☆47Updated 8 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆104Updated 3 years ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆506Updated 7 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆449Updated last year
- SniperPhish - The Web-Email Spear Phishing Toolkit☆524Updated 4 months ago
- custom evilginx2☆10Updated 6 months ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆145Updated 4 years ago
- Evilginx Phishing Engagement Infrastructure Setup Guide☆276Updated last month
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆281Updated 3 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆480Updated 6 months ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆442Updated 3 months ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆328Updated 9 months ago
- ☆273Updated last year
- GoPhish Templates that I have retired and/or templates I've recreated.☆163Updated 3 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆250Updated 3 months ago
- This is a collection of phishing templates and a landing page to be used with goPhish☆356Updated 2 years ago
- evilginx3 + gophish☆1,610Updated 3 months ago
- AV evading OSX Backdoor and Crypter Framework☆272Updated 6 months ago
- Collection of GoPhish templates available for legitimate usage.☆140Updated last year
- Hide your payload into .jpg file☆384Updated 2 years ago
- zerosum0x0's Koadic☆257Updated 2 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆401Updated 6 months ago
- Remote persistent 🔑Logger for Windows and Linux☆294Updated last year
- Simple & Powerful PowerShell Script Obfuscator☆432Updated last year
- Ready to go Phishing Platform☆836Updated last month
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆215Updated 3 years ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆335Updated 3 months ago
- Python AV Evasion Tools☆489Updated 2 years ago
- Generates millions of keyword-based password mutations in seconds.☆1,060Updated last month
- Python 3.x based email spoofer☆225Updated 5 months ago