ss23 / evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆18Updated 2 years ago
Alternatives and similar repositories for evilginx2:
Users that are interested in evilginx2 are comparing it to the libraries listed below
- Automated Evilginx phishlet creator Extension for Burpsuite☆49Updated 4 months ago
- Public repo of some woking evilginx phishlets☆32Updated 6 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆12Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- LNK-Dropper Builder☆22Updated last month
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- ☆10Updated 4 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 8 months ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- Passworld is a fully customizable wordlist generator☆15Updated 7 months ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 4 months ago
- Excel Add In Payload Generator☆10Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆20Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆24Updated last month
- Citrix Phishlet☆24Updated 4 years ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆18Updated 6 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 7 months ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆18Updated 2 years ago
- File Manager☆12Updated last week
- ☆17Updated 2 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 11 months ago
- ☆14Updated last month