kgretzky / evilginx2Links
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆13,907Updated last week
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- Modlishka. Reverse Proxy.☆5,177Updated 4 months ago
- Open-Source Phishing Toolkit☆13,169Updated last year
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆12,461Updated 11 months ago
- Attack Surface Management Platform☆9,123Updated 2 weeks ago
- Adversary Emulation Framework☆10,069Updated last week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,400Updated 5 months ago
- Directory/File, DNS and VHost busting tool written in Go☆12,651Updated 2 weeks ago
- In-depth attack surface mapping and asset discovery☆13,625Updated last month
- Fast web fuzzer written in Go☆14,877Updated 5 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,067Updated last month
- Fast passive subdomain enumeration tool.☆12,365Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,843Updated 2 weeks ago
- Fast subdomains enumeration tool for penetration testers☆10,622Updated last year
- A fast, simple, recursive content discovery tool written in Rust.☆7,022Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,503Updated last year
- A swiss army knife for pentesting networks☆8,937Updated last year
- The Havoc Framework☆7,872Updated 3 months ago
- Next generation web scanner☆6,126Updated last week
- Veil 3.1.X (Check version info in Veil at runtime)☆4,153Updated 2 years ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,174Updated 3 weeks ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,201Updated this week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,249Updated 4 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,708Updated 5 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,198Updated 2 weeks ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,086Updated 11 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,602Updated last year
- E-mails, subdomains and names Harvester - OSINT☆14,665Updated this week
- The Browser Exploitation Framework Project☆10,474Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,007Updated last week
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,675Updated 2 years ago