Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆18Apr 4, 2023Updated 3 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Modified Version of Evilginx ( Telegram Notifications )☆44Feb 25, 2026Updated 2 months ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆27Feb 27, 2025Updated last year
- Updated o365 Evilginx phishlet for WHfB☆93Mar 16, 2024Updated 2 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Latest version of evilginx2 + Telegram modification and working Ionos mail phishlet.☆19Jul 3, 2024Updated last year
- custom evilginx2☆11Mar 10, 2024Updated 2 years ago
- Public repo of some woking evilginx phishlets☆41Nov 4, 2024Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆143Jan 28, 2025Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆163Apr 16, 2025Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆563Jun 3, 2025Updated 11 months ago
- Latest Evilginx Modification + Custom Features such as Telegram WebHook, latest anti detection, server side query to identify and bypass …☆12Apr 30, 2024Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Zero font obfuscation for your html letters. Multiple alphabets☆12Apr 11, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- sturdy-chainsaw☆71Aug 10, 2023Updated 2 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆13Apr 21, 2023Updated 3 years ago
- HTML 5 WYSIWYG Editor☆40Aug 25, 2017Updated 8 years ago
- A Golang ChatGPT TelegramBot project, quickly built on the platform Render☆11Jan 17, 2023Updated 3 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Utilities for automatically submitting website pages for indexing in bulk to Google Search Console☆16Jun 4, 2024Updated last year
- Simulate Windows EXE for Malware Research!☆20Sep 4, 2024Updated last year
- evilginx2 + gophish☆18Oct 5, 2022Updated 3 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Kalian Mau Hack Bank Bukan ?☆10Apr 29, 2019Updated 7 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆18Sep 24, 2024Updated last year
- ☆21Nov 28, 2022Updated 3 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated 4 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- URLs very strong obfuscation tool (can be used in requests too)☆18Oct 3, 2024Updated last year
- G-Surge☆10Feb 7, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated 2 years ago
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago
- Crypto Payment Gateway☆26Sep 8, 2022Updated 3 years ago
- Check for the existence of an email on Google platforms☆18Mar 20, 2024Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- MacOS Shared Library to Shellcode Loader☆67Feb 23, 2026Updated 2 months ago
- Easily obfuscate your html!☆100Apr 7, 2024Updated 2 years ago