Evilginx2
A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

Evilginx2
A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.
Evilginx2 Description
Evilginx2 is a standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication. It is a powerful tool for simulating phishing attacks and can be used for penetration testing and security research. The framework allows attackers to steal login credentials and session cookies, and can bypass 2-factor authentication. It is a useful tool for security professionals to test the security of their systems and identify vulnerabilities. Evilginx2 is a powerful tool that can be used for malicious purposes, and its use should be limited to legitimate security testing and research purposes only.
Evilginx2 FAQ
Common questions about Evilginx2 including features, pricing, alternatives, and user reviews.
Evilginx2 is A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.. It is a Security Operations solution designed to help security teams with Phishing, Security Research, Penetration Testing.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox