EvilHoster / evilginx-3.4.0-telegram-modificationLinks
Latest version of evilginx2 + Telegram modification and working Ionos mail phishlet.
☆17Updated last year
Alternatives and similar repositories for evilginx-3.4.0-telegram-modification
Users that are interested in evilginx-3.4.0-telegram-modification are comparing it to the libraries listed below
Sorting:
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13Updated 2 years ago
- UAdmin Phishlets for common sites☆16Updated 7 months ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Updated last year
- Free o365.yaml and updated version of evilginx with all bypass methods included.☆23Updated last year
- ☆22Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆25Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆16Updated 5 months ago
- The Clipboard Hijacker Payload aims to monitor, capture, and potentially manipulate clipboard data on a target machine.☆31Updated last year
- A GUI based program for making customised crypto stealing malware written in python☆46Updated 4 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆39Updated 2 years ago
- ☆10Updated 3 years ago
- Website Phishing Source Code☆34Updated 3 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆79Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- Clipboard poisoning attack.☆59Updated 5 years ago
- Simple Ransoware to attack Windows 🌟☆24Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆56Updated 4 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Updated 4 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆14Updated 4 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Updated 3 years ago
- custom evilginx2☆10Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆56Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 4 months ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆96Updated 9 months ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆39Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated last year