charlesbel / Evilginx2-PhishletsLinks
Many Evilginx2 Phishlets Uptodate
☆50Updated last year
Alternatives and similar repositories for Evilginx2-Phishlets
Users that are interested in Evilginx2-Phishlets are comparing it to the libraries listed below
Sorting:
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆38Updated 2 years ago
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆707Updated 4 months ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆156Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆112Updated 4 years ago
- custom evilginx2☆8Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆134Updated 3 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆136Updated 2 months ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Collection of GoPhish templates available for legitimate usage.☆155Updated 2 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆187Updated last month
- Browser streaming MITM proxy☆65Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- ☆157Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆415Updated 3 weeks ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆17Updated 3 months ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆26Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆300Updated last year
- Updated o365 Evilginx phishlet for WHfB☆27Updated last year
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆505Updated last year
- Open-Source Phishing Toolkit☆199Updated 8 months ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆162Updated last year
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆86Updated 2 years ago
- ☆122Updated last year
- AV evading OSX Backdoor and Crypter Framework☆288Updated last year
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆33Updated 11 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆35Updated 11 months ago
- ☆23Updated 2 years ago