charlesbel / Evilginx2-PhishletsLinks
Many Evilginx2 Phishlets Uptodate
☆54Updated 2 months ago
Alternatives and similar repositories for Evilginx2-Phishlets
Users that are interested in Evilginx2-Phishlets are comparing it to the libraries listed below
Sorting:
- Collection of GoPhish templates available for legitimate usage.☆168Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆348Updated last year
- Open-Source Phishing Toolkit☆269Updated 6 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆189Updated 9 months ago
- C2 server to connect to a victim machine via reverse shell☆55Updated 3 years ago
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆120Updated 5 years ago
- GoPhish Templates that I have retired and/or templates I've recreated.☆206Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆175Updated 2 years ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆61Updated last year
- ☆210Updated 2 years ago
- ☆125Updated last year
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆310Updated 2 months ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆166Updated 5 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆272Updated 4 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆79Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆28Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- Repo containing cracked red teaming tools.☆219Updated 3 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆530Updated 8 months ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆368Updated 4 months ago
- Spearphishing tools, generate masqueraded pocket executable☆107Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆161Updated 9 months ago
- Browser streaming MITM proxy☆75Updated 2 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆445Updated last year
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆102Updated 2 years ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆564Updated 7 months ago
- Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.☆206Updated 2 years ago