ss23 / evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆18Updated last year
Alternatives and similar repositories for evilginx2:
Users that are interested in evilginx2 are comparing it to the libraries listed below
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Passworld is a fully customizable wordlist generator☆14Updated 6 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆20Updated 3 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Updated last year
- LNK-Dropper Builder☆20Updated 5 months ago
- Public repo of some woking evilginx phishlets☆29Updated 4 months ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆26Updated this week
- Slides and videos from talks given at cons☆13Updated 8 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- ECC Public Key Cryptography☆36Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 6 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- Citrix Phishlet☆22Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆28Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 10 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆15Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆24Updated 4 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 5 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 10 months ago
- An offensive security framework for writing payloads☆15Updated 2 years ago