kgretzky / evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆10,634Updated 3 weeks ago
Related projects: ⓘ
- In-depth attack surface mapping and asset discovery☆11,798Updated this week
- Attack Surface Management Platform☆7,936Updated last month
- Fast web fuzzer written in Go☆12,270Updated 2 months ago
- Directory/File, DNS and VHost busting tool written in Go☆9,580Updated last week
- Fast passive subdomain enumeration tool.☆9,963Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆16,263Updated this week
- Open-Source Phishing Toolkit☆11,232Updated last month
- A swiss army knife for pentesting networks☆8,355Updated 9 months ago
- A Workflow Engine for Offensive Security☆5,269Updated 3 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆15,744Updated this week
- Fast subdomains enumeration tool for penetration testers☆9,679Updated last month
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆12,702Updated last month
- Adversary Emulation Framework☆8,239Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆13,291Updated 2 weeks ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆8,959Updated 2 weeks ago
- E-mails, subdomains and names Harvester - OSINT☆11,100Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆10,628Updated 3 weeks ago
- A Tool for Domain Flyovers☆5,604Updated 2 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆6,886Updated last week
- Nikto web server scanner☆8,336Updated last week
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,113Updated last year
- Fast and customizable vulnerability scanner based on simple YAML based DSL.☆19,931Updated this week
- The Havoc Framework.☆6,640Updated this week
- Next generation web scanner☆5,448Updated 2 months ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆5,574Updated 3 months ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,417Updated 7 months ago
- Modlishka. Reverse Proxy.☆4,792Updated 5 months ago
- Exploitation Framework for Embedded Devices☆12,116Updated 3 months ago
- Monitor linux processes without root permissions☆4,854Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,089Updated 3 weeks ago