kgretzky / evilginx2Links
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆13,580Updated 6 months ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- Open-Source Phishing Toolkit☆12,937Updated 10 months ago
- Modlishka. Reverse Proxy.☆5,060Updated 2 months ago
- In-depth attack surface mapping and asset discovery☆13,401Updated last week
- Adversary Emulation Framework☆9,791Updated 3 weeks ago
- Fast passive subdomain enumeration tool.☆12,094Updated 2 weeks ago
- Fast subdomains enumeration tool for penetration testers☆10,529Updated last year
- The Havoc Framework☆7,746Updated last month
- E-mails, subdomains and names Harvester - OSINT☆13,189Updated this week
- Fast web fuzzer written in Go☆14,424Updated 3 months ago
- Attack Surface Management Platform☆8,938Updated 2 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,715Updated 2 weeks ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆15,006Updated 7 months ago
- Directory/File, DNS and VHost busting tool written in Go☆12,313Updated 2 weeks ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,330Updated 3 months ago
- Web application fuzzer☆6,245Updated 11 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,960Updated this week
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆12,215Updated 9 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆64,704Updated this week
- A Workflow Engine for Offensive Security☆5,782Updated this week
- A swiss army knife for pentesting networks☆8,852Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆24,258Updated last week
- Advanced vulnerability scanning with Nmap NSE☆3,644Updated 11 months ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,891Updated 9 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,219Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,960Updated 2 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,424Updated last year
- An open-source post-exploitation framework for students, researchers and developers.☆9,245Updated this week
- Automated Mass Exploiter☆5,146Updated 2 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,636Updated last year
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,410Updated last year