BakkerJan / evilginx2Links
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆16Updated 3 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- ☆313Updated 2 years ago
- sturdy-chainsaw☆67Updated 2 years ago
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆61Updated 2 years ago
- PowerShell Obfuscator☆221Updated 3 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆159Updated 7 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆261Updated 2 months ago
- Generate FUD backdoors☆263Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆142Updated 3 years ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 3 years ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆215Updated 7 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆343Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆556Updated 5 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆132Updated last week
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆479Updated 6 months ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆225Updated 8 months ago
- ☆106Updated last year
- A real fake social engineering app☆128Updated 5 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆165Updated 5 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆185Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆73Updated 2 years ago
- ☆306Updated last year
- Open-Source Phishing Toolkit☆255Updated 4 months ago