belph3gorgit / EvilGinx-3.5-bypassLinks
Free o365.yaml and updated version of evilginx with all bypass methods included.
☆15Updated last year
Alternatives and similar repositories for EvilGinx-3.5-bypass
Users that are interested in EvilGinx-3.5-bypass are comparing it to the libraries listed below
Sorting:
- Latest version of evilginx2 + Telegram modification and working Ionos mail phishlet.☆14Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆158Updated 7 months ago
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆60Updated 2 years ago
- Updated o365 Evilginx phishlet for WHfB☆86Updated last year
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆14Updated 3 years ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆39Updated 3 months ago
- ☆129Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆57Updated 7 months ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Updated 2 years ago
- PDF dropper Red Team Scenairos☆226Updated last year
- Browser streaming MITM proxy☆75Updated 2 years ago
- ☆52Updated last week
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13Updated 2 years ago
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆27Updated 7 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆92Updated 9 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Updated last month
- Public repo of some woking evilginx phishlets☆38Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆128Updated 7 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆474Updated 5 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆20Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆87Updated 7 months ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆284Updated last week
- send Captured Evilginx sessions to Telegram , Mail and Discord☆23Updated 9 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆209Updated last month
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆341Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- ☆49Updated last year
- Dynamic shellcode loader with sophisticated evasion capabilities☆257Updated last month
- Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088☆43Updated 3 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆103Updated last year