BakkerJan / evilginx2Links
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆16Updated 3 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- ☆324Updated 2 years ago
- sturdy-chainsaw☆69Updated 2 years ago
- PowerShell Obfuscator☆226Updated 5 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 3 years ago
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆61Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆60Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆92Updated last week
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆160Updated 9 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆264Updated last month
- Open-Source Phishing Toolkit☆266Updated 6 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆346Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆525Updated 7 months ago
- Azure Service Subdomain Enumeration☆69Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆74Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆174Updated last year
- Generate FUD backdoors☆262Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Updated 2 years ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆563Updated 7 months ago
- ☆106Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 9 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆146Updated last month