kgretzky / evilginx2Links
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆14,490Updated 3 months ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- Open-Source Phishing Toolkit☆13,516Updated last year
- Attack Surface Management Platform☆9,350Updated 2 weeks ago
- In-depth attack surface mapping and asset discovery☆14,007Updated last week
- Modlishka. Reverse Proxy.☆5,246Updated 3 weeks ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,924Updated last year
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,495Updated 7 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,151Updated this week
- A swiss army knife for pentesting networks☆9,036Updated 2 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,479Updated 9 months ago
- A Modern Orchestration Engine for Security☆6,035Updated this week
- Veil 3.1.X (Check version info in Veil at runtime)☆4,190Updated 2 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,466Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,067Updated 3 months ago
- The Browser Exploitation Framework Project☆10,667Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,730Updated 3 weeks ago
- Fast subdomains enumeration tool for penetration testers☆10,773Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,277Updated this week
- Fast passive subdomain enumeration tool.☆12,885Updated 2 weeks ago
- Web application fuzzer☆6,384Updated this week
- Fast web fuzzer written in Go☆15,457Updated 9 months ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,538Updated this week
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,403Updated 11 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,310Updated 8 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,776Updated 6 years ago
- Adversary Emulation Framework☆10,560Updated last week
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,413Updated last year
- Monitor linux processes without root permissions☆5,851Updated 3 years ago
- A Tool for Domain Flyovers☆5,892Updated 3 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,942Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,472Updated 3 months ago