Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆18Apr 4, 2023Updated 2 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Modified Version of Evilginx ( Telegram Notifications )☆36Feb 25, 2026Updated 3 weeks ago
- send Captured Evilginx sessions to Telegram , Mail and Discord☆26Feb 27, 2025Updated last year
- Updated o365 Evilginx phishlet for WHfB☆91Mar 16, 2024Updated 2 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- custom evilginx2☆10Mar 10, 2024Updated 2 years ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆141Jan 28, 2025Updated last year
- ☆20Dec 20, 2023Updated 2 years ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆160Apr 16, 2025Updated 11 months ago
- EvilPunch is a reverse proxy framework intended for authorized red teaming, adversary / Phishing emulation, and educational security rese…☆17Nov 3, 2025Updated 4 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆545Jun 3, 2025Updated 9 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆12Nov 27, 2020Updated 5 years ago
- Zero font obfuscation for your html letters. Multiple alphabets☆11Apr 11, 2021Updated 4 years ago
- sturdy-chainsaw☆70Aug 10, 2023Updated 2 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆12Apr 21, 2023Updated 2 years ago
- HTML 5 WYSIWYG Editor☆40Aug 25, 2017Updated 8 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- evilginx2 + gophish☆18Oct 5, 2022Updated 3 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Kalian Mau Hack Bank Bukan ?☆10Apr 29, 2019Updated 6 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- ☆18Sep 24, 2024Updated last year
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated 2 months ago
- ☆20Nov 28, 2022Updated 3 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago
- Crypto Payment Gateway☆26Sep 8, 2022Updated 3 years ago
- Check for the existence of an email on Google platforms☆18Mar 20, 2024Updated 2 years ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Dec 24, 2025Updated 2 months ago
- Easily obfuscate your html!☆100Apr 7, 2024Updated last year
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆59Mar 1, 2026Updated 2 weeks ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year