charlesbel / Evilginx2-Phishlets
Many Evilginx2 Phishlets Uptodate
☆49Updated last year
Alternatives and similar repositories for Evilginx2-Phishlets:
Users that are interested in Evilginx2-Phishlets are comparing it to the libraries listed below
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆26Updated 2 years ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆150Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆108Updated 4 years ago
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆651Updated last month
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆123Updated 8 months ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆13Updated last month
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆380Updated 3 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆127Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆286Updated 9 months ago
- ☆20Updated 2 years ago
- Browser streaming MITM proxy☆60Updated last year
- Open-Source Phishing Toolkit☆166Updated 5 months ago
- Create a fully undetectable backdoor with simple steps.☆73Updated 3 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆76Updated last year
- ☆291Updated last year
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆25Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆59Updated 3 years ago
- Collection of GoPhish templates available for legitimate usage.☆150Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆176Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Method to bypass Google's JS security when using MITM phishing tools☆59Updated last year
- custom evilginx2☆9Updated last year
- Automatically clone websites and patch them with PHP to create phishing pages☆51Updated 2 weeks ago
- Tool to evade Antivirus With Different Techniques☆172Updated last year
- ☆120Updated last year
- Ready to go Phishing Platform☆40Updated 5 months ago
- C2 server to connect to a victim machine via reverse shell☆53Updated 3 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- ☆147Updated last year
- sturdy-chainsaw☆57Updated last year