ArchonLabs / evilginx2-phishlets
Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training
☆23Updated last year
Alternatives and similar repositories for evilginx2-phishlets:
Users that are interested in evilginx2-phishlets are comparing it to the libraries listed below
- send Captured Evilginx sessions to Telegram , Mail and Discord☆13Updated this week
- Many Evilginx2 Phishlets Uptodate☆49Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆114Updated 7 months ago
- Evilginx 3 [PHISHLET] LAB by Evi1Grey5 [ CUSTOM CREATION / FREE / DEVELOPMENT / LABORATORY ]☆46Updated this week
- custom evilginx2☆10Updated 11 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆123Updated 2 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆339Updated 2 months ago
- Open-Source Phishing Toolkit☆147Updated 4 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆124Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆278Updated 8 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆74Updated last year
- Browser streaming MITM proxy☆55Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆59Updated 3 years ago
- sturdy-chainsaw☆53Updated last year
- Ready to go Phishing Platform☆38Updated 4 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 7 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆32Updated 7 months ago
- ☆21Updated last year
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆27Updated this week
- This is for Ethical Use only!☆29Updated 2 weeks ago
- Updated o365 Evilginx phishlet for WHfB☆17Updated 11 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆95Updated last year
- ☆288Updated last year
- Generate FUD backdoors☆243Updated last year
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆627Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12Updated 2 years ago
- ☆144Updated last year
- Collection of GoPhish templates available for legitimate usage.☆149Updated last year