evilginx2
evilginx2 copied to clipboard
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
I've been making updates to a phishlet all day only to realize the reason none of my changes have been showing up is because Evilginx has been been reading and...
After email & password when submit everything working perfectly when device verification show I am click yes but phishing page not redirect after verification complete anyone can help me ?...
i'm having problems with js requests that fail, the page comes out, but it comes out with wrong graphics, I'm looking for someone who can help me
server crashed. happened while there was an active lure. here trace ``` panic: runtime error: index out of range [1] with length 1 goroutine 35318 [running]: github.com/inconshreveable/go-vhost.readClientHello({0xd3c700?, 0xc0006177a0?}) /home/snoop/github/evilgophish/evilginx3/vendor/github.com/inconshreveable/go-vhost/tls.go:259 +0x2b3...
Currently, Evilginx only saves sessions when all tokens, including 2FA tokens, are captured. This means that if a user enters a correct username and password but does not approve the...
The phishlet works but if the target is already singed in on their device when they click on lure it auto logs them into my phishlet site and i capture...
what does [+++] [0] detected authorization URL - tokens intercepted: /mail/0/sw.js mean? how do i access this file?
Hello, This small PR enables template paramaters to be used within the `intercept` section (currently replacing in domain and body). Have a good day,