Evilginx2 Logo

Evilginx2

0
Free
Visit Website

Evilginx2 is a standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication. It is a powerful tool for simulating phishing attacks and can be used for penetration testing and security research. The framework allows attackers to steal login credentials and session cookies, and can bypass 2-factor authentication. It is a useful tool for security professionals to test the security of their systems and identify vulnerabilities. Evilginx2 is a powerful tool that can be used for malicious purposes, and its use should be limited to legitimate security testing and research purposes only.

FEATURES

ALTERNATIVES

Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.

A tool that checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.

Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...

Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

A cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments

CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.

A subdomain enumeration tool for bug hunting and pentesting

Chameleon aids in evading proxy categorization to bypass internet filters.

PINNED