This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically for use with Evilginx3. May be updated periodically.
☆695May 27, 2025Updated 10 months ago
Alternatives and similar repositories for Evilginx3-Phishlets
Users that are interested in Evilginx3-Phishlets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆162Apr 16, 2025Updated 11 months ago
- evilginx3 + gophish☆1,976Jun 15, 2024Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆442May 29, 2024Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆551Jun 3, 2025Updated 10 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- sturdy-chainsaw☆70Aug 10, 2023Updated 2 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆621Apr 2, 2026Updated last week
- send Captured Evilginx sessions to Telegram , Mail and Discord☆26Feb 27, 2025Updated last year
- Many Evilginx2 Phishlets Uptodate☆61Dec 7, 2025Updated 4 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,068Mar 1, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,816Oct 6, 2025Updated 6 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Ready to go Phishing Platform☆1,122May 6, 2025Updated 11 months ago
- ☆720Mar 22, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- ☆569Mar 28, 2024Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆906Updated this week
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆310Dec 9, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Send phishing messages and attachments to Microsoft Teams users☆1,113Jun 19, 2024Updated last year
- Amsi Bypass payload that works on Windwos 11☆379Jul 30, 2023Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆353Jun 12, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆444Dec 21, 2023Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,078Feb 1, 2024Updated 2 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆514May 19, 2025Updated 10 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆790Jan 26, 2026Updated 2 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆263Jun 29, 2024Updated last year
- ☆20Dec 20, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 3 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆279Apr 17, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,018Jan 7, 2026Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,009Jun 4, 2024Updated last year