Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆18Apr 4, 2023Updated 2 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆13Dec 13, 2021Updated 4 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆31Updated this week
- Updated o365 Evilginx phishlet for WHfB☆89Mar 16, 2024Updated last year
- custom evilginx2☆10Mar 10, 2024Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆140Jan 28, 2025Updated last year
- ☆18Sep 24, 2024Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆33Mar 5, 2025Updated 11 months ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Public repo of some woking evilginx phishlets☆39Nov 4, 2024Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆161Apr 16, 2025Updated 10 months ago
- Check for the existence of an email on Google platforms☆18Mar 20, 2024Updated last year
- MacOS Shared Library to Shellcode Loader☆51Updated this week
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated last month
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- send Captured Evilginx sessions to Telegram , Mail and Discord☆25Feb 27, 2025Updated last year
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆542Jun 3, 2025Updated 8 months ago
- ☆20Nov 28, 2022Updated 3 years ago
- ☆20Dec 20, 2023Updated 2 years ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 11 months ago
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆58Updated this week
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Dec 24, 2025Updated 2 months ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Sep 1, 2023Updated 2 years ago
- ☆27Oct 15, 2025Updated 4 months ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆92Updated this week
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Proof of Concept Exploit for CVE-2024-9465☆30Oct 9, 2024Updated last year
- Eating 2FA for Breakfast☆57Nov 2, 2022Updated 3 years ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Deploy a phishing infrastructure on the fly.☆77Dec 21, 2024Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆182Jun 9, 2024Updated last year
- sturdy-chainsaw☆69Aug 10, 2023Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆68Nov 15, 2025Updated 3 months ago
- ☆58Jun 2, 2025Updated 8 months ago