ss23 / evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆18Updated 2 years ago
Alternatives and similar repositories for evilginx2:
Users that are interested in evilginx2 are comparing it to the libraries listed below
- Automated Evilginx phishlet creator Extension for Burpsuite☆48Updated 3 months ago
- Public repo of some woking evilginx phishlets☆32Updated 5 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆12Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆21Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆14Updated 11 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆13Updated 3 weeks ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 7 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- ☆11Updated 4 months ago
- Slides and videos from talks given at cons☆13Updated 9 months ago
- LNK-Dropper Builder☆22Updated 2 weeks ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 months ago
- Citrix Phishlet☆24Updated 4 years ago
- A DMARC scanning and parsing tool.☆33Updated last week
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ECC Public Key Cryptography☆37Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆39Updated last year
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12Updated 11 months ago
- ☆34Updated last year
- Passworld is a fully customizable wordlist generator☆15Updated 7 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- Excel Add In Payload Generator☆10Updated last year