froyo75 / docker-evilginx2Links
Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..
☆13Updated 3 years ago
Alternatives and similar repositories for docker-evilginx2
Users that are interested in docker-evilginx2 are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆144Updated 3 months ago
- Updated o365 Evilginx phishlet for WHfB☆58Updated last year
- sturdy-chainsaw☆64Updated last year
- ☆20Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆177Updated last year
- Ready to go Phishing Platform☆51Updated 9 months ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- Method to bypass Google's JS security when using MITM phishing tools☆61Updated last year
- Public repo of some woking evilginx phishlets☆37Updated 9 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆53Updated 6 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆163Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆21Updated 3 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 9 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12Updated 4 years ago
- ☆95Updated 2 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆130Updated 6 months ago
- ☆21Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated last month
- ☆70Updated 4 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- Havoc python api☆42Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago