kgretzky / evilginx
PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2
☆1,140Updated 3 years ago
Alternatives and similar repositories for evilginx:
Users that are interested in evilginx are comparing it to the libraries listed below
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,399Updated 6 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,350Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,341Updated last year
- Ruby on Rails Phishing Framework☆830Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,306Updated 3 years ago
- Find exploits in local and online databases instantly☆1,697Updated 3 years ago
- Phishing Campaign Toolkit☆2,345Updated 7 months ago
- MSFvenom Payload Creator (MSFPC)☆1,247Updated 3 years ago
- Email recon made fast and easy, with a framework to build on☆953Updated 2 years ago
- Undetectable Windows Payload Generation☆1,578Updated 2 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆858Updated 6 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,179Updated 7 years ago
- SpeedPhishing Framework☆444Updated 5 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,170Updated 2 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆909Updated 5 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,093Updated this week
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,715Updated last month
- wide range mass audit toolkit☆997Updated 6 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,266Updated 5 months ago
- Striker is an offensive information and vulnerability scanner.☆2,254Updated last year
- Network Attack Tool☆1,456Updated last year
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆610Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Network Infrastructure Penetration Testing Tool☆1,633Updated 3 years ago
- A framework for wireless pentesting.☆1,203Updated 4 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆987Updated 7 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,486Updated last year
- Generate Gmail Emailing Keyloggers to Windows.☆1,039Updated 2 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,135Updated 4 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆497Updated 5 years ago