ArchonLabs / evilginx2-phishlets
Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training
☆28Updated 2 years ago
Alternatives and similar repositories for evilginx2-phishlets:
Users that are interested in evilginx2-phishlets are comparing it to the libraries listed below
- Many Evilginx2 Phishlets Uptodate☆49Updated last year
- send Captured Evilginx sessions to Telegram , Mail and Discord☆15Updated last month
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆126Updated last week
- Updated o365 Evilginx phishlet for WHfB☆22Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆128Updated 2 years ago
- sturdy-chainsaw☆57Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆391Updated 4 months ago
- Social Engineering Browser Update Attack.☆57Updated last year
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- ☆292Updated 2 years ago
- Ready to go Phishing Platform☆39Updated 6 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆292Updated 10 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆12Updated 3 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆167Updated 10 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 9 months ago
- ☆20Updated 2 years ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆400Updated 10 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated last year
- Obfuscate and run .exe files in a powershell script☆16Updated 2 years ago
- Open-Source Phishing Toolkit☆175Updated 6 months ago
- Generate FUD backdoors☆245Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆76Updated last year
- Browser streaming MITM proxy☆62Updated last year
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆32Updated this week
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 7 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆76Updated 2 years ago