hash3liZer / evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆108Updated 4 years ago
Alternatives and similar repositories for evilginx2:
Users that are interested in evilginx2 are comparing it to the libraries listed below
- Phishlets for Evilginx2 (MITM proxy Framework)☆150Updated 4 years ago
- Many Evilginx2 Phishlets Uptodate☆49Updated last year
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- Automated rogue access point setup tool.☆195Updated 4 years ago
- A powerful PHP email spoofer with a polished UI, rich text editor, and multiple sending options.☆126Updated last year
- An Encrypted File transfer via AES-256-CBC☆49Updated 3 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆120Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆177Updated 2 years ago
- Full Valid Fake Data Generator☆98Updated 6 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆246Updated 4 years ago
- blackhole is a ransomware coded in c#☆27Updated 4 years ago
- Open-Source Collection of Social Engineering Pretexts☆135Updated last year
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆59Updated 3 years ago
- Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆657Updated last month
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆83Updated 2 years ago
- Embedding executable files in PDF Documents☆44Updated 6 years ago
- Method to bypass Google's JS security when using MITM phishing tools☆60Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- Collection of GoPhish templates available for legitimate usage.☆150Updated last year
- Assist reverse tcp shells in post-exploration tasks☆218Updated last year
- XSS cookie stealer using JavaScript and PHP☆65Updated 5 years ago
- ☆147Updated last year
- Simple PHP - Javascript - Webserver Cookie Stealer Script for XSS☆59Updated 6 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆202Updated 8 months ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- PhishX - The Complete Spear Phishing Tool☆108Updated 6 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆293Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago