charlesbel / Evilginx2-PhishletsLinks
Many Evilginx2 Phishlets Uptodate
☆49Updated last year
Alternatives and similar repositories for Evilginx2-Phishlets
Users that are interested in Evilginx2-Phishlets are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆111Updated 4 years ago
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆35Updated 2 years ago
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆694Updated 4 months ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆154Updated 4 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆296Updated 11 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆132Updated last month
- custom evilginx2☆8Updated last year
- ☆21Updated 2 years ago
- Updated o365 Evilginx phishlet for WHfB☆27Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- send Captured Evilginx sessions to Telegram , Mail and Discord☆17Updated 3 months ago
- Method to bypass Google's JS security when using MITM phishing tools☆62Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆134Updated 2 years ago
- Collection of GoPhish templates available for legitimate usage.☆154Updated 2 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆408Updated this week
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆25Updated last year
- Open-Source Phishing Toolkit☆193Updated 7 months ago
- Automatically clone websites and patch them with PHP to create phishing pages☆55Updated last week
- ☆150Updated last year
- AV evading OSX Backdoor and Crypter Framework☆288Updated last year
- Browser streaming MITM proxy☆64Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- ☆122Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆186Updated last month
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 11 months ago
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- ☆254Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- .NET Antivirus Evasion Tool (Exe2Bat)☆37Updated 2 years ago