ss23 / evilginx2Links
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
☆18Updated 2 years ago
Alternatives and similar repositories for evilginx2
Users that are interested in evilginx2 are comparing it to the libraries listed below
Sorting:
- Automated Evilginx phishlet creator Extension for Burpsuite☆52Updated 5 months ago
- Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..☆12Updated 3 years ago
- Public repo of some woking evilginx phishlets☆34Updated 7 months ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 5 months ago
- Slides and videos from talks given at cons☆20Updated last week
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆21Updated 3 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- Excel Add In Payload Generator☆11Updated last year
- An offensive security framework for writing payloads☆17Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Updated 2 years ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week
- Citrix Phishlet☆24Updated 4 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆22Updated 10 months ago
- Updated o365 Evilginx phishlet for WHfB☆27Updated last year
- ☆10Updated 6 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- ☆31Updated 3 weeks ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated last month
- Python3 tool to perform password spraying using RDP☆17Updated last year
- ECC Public Key Cryptography☆38Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- Ready to go Phishing Platform☆51Updated 8 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 9 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year