EvilHoster / evilginx-3.4.0-telegram-modificationLinks
Latest version of evilginx2 + Telegram modification and working Ionos mail phishlet.
☆14Updated last year
Alternatives and similar repositories for evilginx-3.4.0-telegram-modification
Users that are interested in evilginx-3.4.0-telegram-modification are comparing it to the libraries listed below
Sorting:
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13Updated 2 years ago
- UAdmin Phishlets for common sites☆15Updated 5 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆38Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆25Updated 2 years ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆54Updated last month
- Free o365.yaml and updated version of evilginx with all bypass methods included.☆15Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆14Updated 3 months ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆47Updated last year
- Clipboard poisoning attack.☆58Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆20Updated 2 years ago
- Microsoft Outlook/Office Email Valid Checker Also Account cracker/checker V1 By Aron-Tn☆19Updated 2 years ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆39Updated 2 years ago
- Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...☆25Updated 2 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆15Updated 10 months ago
- Browser streaming MITM proxy☆75Updated 2 years ago
- A GUI based program for making customised crypto stealing malware written in python☆45Updated last month
- Simple Ransoware to attack Windows 🌟☆22Updated 2 years ago
- Cryptocurrency wallet decryption program written in C# .NET 7.0☆20Updated 11 months ago
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆69Updated 2 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆111Updated 2 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- Website Phishing Source Code☆32Updated 3 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated last month
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- RDP Stealer☆26Updated 4 years ago
- This is a tool to obfuscate / to make your python code unreadable. It obfuscates your code and prevents easy access of others to your cod…☆42Updated 11 months ago
- GENERATE PYTHON BASED FUD STUB☆19Updated 2 years ago
- Spearphishing tools, generate masqueraded pocket executable☆106Updated 2 years ago