BakkerJan / evilginx2Links
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆14Updated 3 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- ☆309Updated 2 years ago
- sturdy-chainsaw☆66Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆337Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 3 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆155Updated 6 months ago
- PowerShell Obfuscator☆214Updated 2 months ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆89Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆260Updated last month
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆212Updated 6 months ago
- Generate FUD backdoors☆262Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆550Updated 4 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆467Updated 5 months ago
- Open-Source Phishing Toolkit☆247Updated 3 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆167Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆155Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year
- Polymorphic Command & Control☆98Updated 8 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆57Updated 2 years ago
- ☆303Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆65Updated 10 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 7 months ago