itwizardo / evilginx2telegramLinks
Latest version of evilginx2 with Gophish + Telegram modification
☆11Updated last year
Alternatives and similar repositories for evilginx2telegram
Users that are interested in evilginx2telegram are comparing it to the libraries listed below
Sorting:
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆37Updated 3 months ago
- Perfect scripts for all the hustle we have with mass-mailing☆123Updated 5 months ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆55Updated last year
- send Captured Evilginx sessions to Telegram , Mail and Discord☆24Updated 11 months ago
- A super simple asynchronous multithreaded proxy scraper; scraping & checking ~500k HTTP, HTTPS, SOCKS4, & SOCKS5 proxies.☆156Updated last month
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆56Updated 3 months ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆102Updated 2 years ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Updated last year
- Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.☆206Updated 2 years ago
- POC | Steal user WhatsApp information/data☆75Updated 8 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 3 months ago
- xSMTP 🦟 Lightning fast, multithreaded smtp scanner targeting open-relay and unsecured servers in multiple network ranges.☆80Updated 2 years ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆35Updated 2 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆348Updated last year
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆14Updated 4 years ago
- Tool to parse Stealer Logs.☆20Updated 2 years ago
- Tool designed for fetching, validating, and storing working proxies.☆256Updated 2 months ago
- Modified Version of Evilginx ( Telegram Notifications )☆33Updated 9 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated last year
- laravel scanner smtp grabber☆22Updated 2 years ago
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆19Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆188Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆95Updated 9 months ago
- ☆13Updated 2 years ago
- SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.☆102Updated 4 years ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆82Updated 4 months ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆45Updated 8 months ago