Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse proxy server.
☆87Oct 27, 2022Updated 3 years ago
Alternatives and similar repositories for cipherginx
Users that are interested in cipherginx are comparing it to the libraries listed below
Sorting:
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Apr 22, 2019Updated 6 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Feb 27, 2019Updated 7 years ago
- Automatically clone websites and patch them with PHP to create phishing pages☆58May 29, 2025Updated 9 months ago
- Helpful tools for interacting with a GoPhish phishing instance☆48Feb 3, 2026Updated 3 weeks ago
- Lighter Version Of Shark - Best Tool For Phishing With Masking With Original Domain Name☆18Jan 5, 2021Updated 5 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆624May 2, 2025Updated 9 months ago
- sample code to perform aave flashloan with OrFeed https://docs.aave.com/developers/tutorials/performing-a-flash-loan☆10Jan 24, 2023Updated 3 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 9 months ago
- Bypass Two-Factor-Authentication☆49Aug 24, 2017Updated 8 years ago
- OTP Bot One Time Password Verification , Bank , Paypal Bypass 2fa☆27Feb 21, 2023Updated 3 years ago
- ☆18Sep 24, 2024Updated last year
- DeadManSwitch in rust with several triggers (remote local and network)☆16Nov 19, 2025Updated 3 months ago
- ☆18Jun 25, 2024Updated last year
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆18Aug 18, 2021Updated 4 years ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Wi-Fi Exploitation Framework☆15May 8, 2024Updated last year
- This repo contains deobfuscated files of the Redline malware code which was behind the The recent Github Account hacks and stealing sensi…☆15Sep 18, 2024Updated last year
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- A quiz to analyse how well your friends know about you. Phishing Web Application to steal Instagram Passwords☆15May 15, 2024Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- MCP server for AdaptixC2☆24Jul 20, 2025Updated 7 months ago
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- CanIBeSpoofed is a console project utilising functionality built for the https://caniphish.com/free-phishing-tools/email-spoofing-test we…☆46Jan 26, 2025Updated last year
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Database☆100Oct 3, 2024Updated last year
- MalDev & AV-EDR Evasion for Pentesters☆20Feb 17, 2023Updated 3 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Instagram information gathering☆13Feb 6, 2023Updated 3 years ago
- A Multi-Tool Beamer Made Using Python | Version v1.0 | DM Me For Price & Buying.☆12Jul 9, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- hack facebook multi bruteforce random milik PIRMANSX,... di back up kembali, gunakan dengan bijak☆13Nov 27, 2018Updated 7 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Aug 17, 2022Updated 3 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆25Jun 30, 2022Updated 3 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,046Feb 18, 2026Updated last week
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆180Feb 27, 2024Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- 27 ways to bypass 2FA/otp☆52Jul 20, 2023Updated 2 years ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago