evilginx2
evilginx2 copied to clipboard
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Cheers
fix a wrong command in error message: phishlet > phishlets
Fully working !
Hi, I have added a restarting feature to the tool. It is useful in some cases. I have tested it and it is working fine. Hoping people to like it....
This solves this issue: https://github.com/kgretzky/evilginx2/issues/514
Hey there, After quite a long debugging session, I noticed that `.security` TLD wasn't part of the URL matching regex. My company's TLD is `.security`, and all my tests were...
Corporate red teams frequently run phishing campaigns against employees to build awareness of phishing risk and train employees on how to identify phishing attacks. This simulated risks should not store...
The change handles the case of having the hostname:port format in the server response. It removes the port from the hostname while checking if there is a match in the...
Welcome back @kgretzky - as you closed issues I've already added most things in the [most popular fork](https://github.com/hash3liZer/evilginx2). Maybe having multiple contributors can help keep this active long term? Anyways,...