This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically for use with Evilginx3. May be updated periodically.
☆707May 27, 2025Updated 11 months ago
Alternatives and similar repositories for Evilginx3-Phishlets
Users that are interested in Evilginx3-Phishlets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆162Apr 16, 2025Updated last year
- evilginx3 + gophish☆1,988Jun 15, 2024Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆442May 29, 2024Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆557Jun 3, 2025Updated 10 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Jun 9, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- sturdy-chainsaw☆71Aug 10, 2023Updated 2 years ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆628Apr 2, 2026Updated 3 weeks ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆26Feb 27, 2025Updated last year
- Many Evilginx2 Phishlets Uptodate☆62Dec 7, 2025Updated 4 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,075Mar 1, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,003Oct 6, 2025Updated 6 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Ready to go Phishing Platform☆1,130May 6, 2025Updated 11 months ago
- ☆721Mar 22, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Template Nuclei SSTI☆34Nov 18, 2025Updated 5 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,383Oct 27, 2023Updated 2 years ago
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- ☆570Mar 28, 2024Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆912Updated this week
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆313Dec 9, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Send phishing messages and attachments to Microsoft Teams users☆1,114Jun 19, 2024Updated last year
- Amsi Bypass payload that works on Windwos 11☆381Jul 30, 2023Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆354Jun 12, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆449Dec 21, 2023Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,079Feb 1, 2024Updated 2 years ago
- A list of python tools to help create an OPSEC-safe Cobalt Strike profile.☆516May 19, 2025Updated 11 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆792Jan 26, 2026Updated 3 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆264Jun 29, 2024Updated last year
- ☆20Dec 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 3 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆236Feb 12, 2025Updated last year
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆284Apr 17, 2023Updated 3 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,022Jan 7, 2026Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,253Mar 28, 2025Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,014Jun 4, 2024Updated last year