evilginx2 icon indicating copy to clipboard operation
evilginx2 copied to clipboard

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

Results 370 evilginx2 issues
Sort by recently updated
recently updated
newest added

**Update** (23/08/25): the PR adds - [fix] request interception - [fix] request header capture - [feature] response interception - [feature] response header capture --- Hello there, This PR contains two...

The HTTP proxy should respect IPv4 address set in configuration and not listen on 0.0.0.0 so it won't interfere with other daemons listening on the same port on different (specific)...

Hi! I have been working on handling the response headers. Instead of deleting most of them, with this change, evilginx adapts them with the correct phishing domain. This was tested...

There where quite a few TLD missing from the `http_proxy.go`. I added them from the original list but excluded special character TLDs. The sort order is on purpose (longest to...

The session summary display table in terminal.go previously used Sprintf for formatting text (phishlet, username, password, and URL). When any of these contined a '%' followed by specific characters, as...

Enhanced Javascript : - MutationObserver to wait for form to load - Prevent and disable propagation when clicking on login - Send the password unencoded to Evilginx2 threw a useless...

This PR adds the ability to configure webhook notifications via the evilginx config file. By setting `webhook_url` and `webhook_param`, it is possible to extract params from proxied requests and forward...

V1. 2FA/Session tokens capture does not work. Will only grab User/Pass.

While deprecated, it may be good practice to remove these headers to help prevent any reported violations.