Evilginx2 is a standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication. It is a powerful tool for simulating phishing attacks and can be used for penetration testing and security research. The framework allows attackers to steal login credentials and session cookies, and can bypass 2-factor authentication. It is a useful tool for security professionals to test the security of their systems and identify vulnerabilities. Evilginx2 is a powerful tool that can be used for malicious purposes, and its use should be limited to legitimate security testing and research purposes only.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.
Macro_Pack is a tool used to automate obfuscation and generation of Office documents for pentest, demo, and social engineering assessments.
DueDLLigence is an open-source tool for identifying and analyzing DLL hijacking vulnerabilities in Windows applications, providing automated analysis and remediation guidance.
Insights on Red Teaming for Pacific Rim CCDC 2016 competition, focusing on preparation, operations plan, and automation.
A tool for mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
A cheat sheet providing examples of creating reverse shells for penetration testing.
Data exfiltration & infiltration tool using text-based steganography to evade security controls.
A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.