simplerhacking / Evilginx3-PhishletsLinks
This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically for use with Evilginx3. May be updated periodically.
☆630Updated 5 months ago
Alternatives and similar repositories for Evilginx3-Phishlets
Users that are interested in Evilginx3-Phishlets are comparing it to the libraries listed below
Sorting:
- List of hostnames and keywords that I've found to be incredibly effective when customizing domains, documents, lures and URLs of live phi…☆13Updated 2 years ago
 - Evilginx3 Phishlet Templates☆19Updated last year
 - A free and very decent nitro token checker. ~0.02s / token!☆20Updated last year
 - The fastest, most feature-packed, "Discord Auto Advertiser" to exist.☆56Updated last year
 - EternalHush - new free advanced open-source c2 framework☆16Updated 2 years ago
 - Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes☆763Updated 8 months ago
 - Open-Source Phishing Toolkit☆247Updated 3 months ago
 - Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆57Updated 2 years ago
 - Many Evilginx2 Phishlets Uptodate☆50Updated last year
 - send Captured Evilginx sessions to Telegram , Mail and Discord☆23Updated 8 months ago
 - Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆467Updated 5 months ago
 - A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆425Updated last year
 - Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆336Updated last year
 - Send phishing messages and attachments to Microsoft Teams users☆1,092Updated last year
 - Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆155Updated 6 months ago
 - ☆303Updated last year
 - Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆564Updated 5 months ago
 - 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆547Updated 4 months ago
 - Matkap - hunt down malicious Telegram bots☆790Updated 2 months ago
 - Phishing with a fake reCAPTCHA☆619Updated last year
 - Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆432Updated last month
 - A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆487Updated last week
 - Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆437Updated 2 months ago
 - evilginx3 + gophish☆1,890Updated last year
 - This is for Ethical Use only.☆439Updated 5 months ago
 - ☆309Updated 2 years ago
 - A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆478Updated last month
 - Repo containing cracked red teaming tools.☆196Updated 2 months ago
 - A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆806Updated 7 months ago
 - PDF dropper Red Team Scenairos☆224Updated last year