kgretzky / evilginx2Links
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆13,812Updated 8 months ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,382Updated 5 months ago
- Modlishka. Reverse Proxy.☆5,107Updated 3 months ago
- Adversary Emulation Framework☆10,009Updated this week
- A swiss army knife for pentesting networks☆8,920Updated last year
- The Havoc Framework☆7,836Updated 2 months ago
- E-mails, subdomains and names Harvester - OSINT☆14,497Updated this week
- Directory/File, DNS and VHost busting tool written in Go☆12,543Updated last week
- Open-Source Phishing Toolkit☆13,115Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,382Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,033Updated last month
- Empire is a PowerShell and Python post-exploitation agent.☆7,702Updated 5 years ago
- Attack Surface Management Platform☆9,080Updated 3 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,474Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,831Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆14,831Updated last week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,358Updated 11 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,454Updated this week
- Veil 3.1.X (Check version info in Veil at runtime)☆4,151Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,840Updated 2 weeks ago
- Fast web fuzzer written in Go☆14,777Updated 4 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,034Updated 2 weeks ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,741Updated last week
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,040Updated 10 months ago
- Six Degrees of Domain Admin☆10,332Updated last month
- In-depth attack surface mapping and asset discovery☆13,565Updated 2 weeks ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,239Updated 4 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,359Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,752Updated 5 years ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,114Updated this week
- A Workflow Engine for Offensive Security