belph3gorgit / EvilGinx-3.5-bypassLinks
Free o365.yaml and updated version of evilginx with all bypass methods included.
☆11Updated 9 months ago
Alternatives and similar repositories for EvilGinx-3.5-bypass
Users that are interested in EvilGinx-3.5-bypass are comparing it to the libraries listed below
Sorting:
- Latest version of evilginx2 + Telegram modification and working Ionos mail phishlet.☆12Updated last year
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆51Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆148Updated 5 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Updated 3 years ago
- Updated o365 Evilginx phishlet for WHfB☆80Updated last year
- send Captured Evilginx sessions to Telegram , Mail and Discord☆21Updated 6 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆452Updated 3 months ago
- PDF dropper Red Team Scenairos☆223Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆105Updated this week
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆313Updated last year
- CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection☆23Updated 5 months ago
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆119Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆52Updated 4 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- ☆25Updated last year
- POC | Steal user WhatsApp information/data☆73Updated 4 months ago
- Python GUI based tool to generate lnk files with a payload and decoy files embedded inside.☆27Updated 3 weeks ago
- Generate FUD backdoors☆253Updated 2 years ago
- sturdy-chainsaw☆65Updated 2 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆111Updated last year
- execute PE in memory Filelessly☆45Updated 7 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆16Updated last month
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆188Updated 6 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆41Updated this week
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated last year
- Browser streaming MITM proxy☆70Updated 2 years ago
- Many Evilginx2 Phishlets Uptodate☆50Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆37Updated last year