powershell
evilginx2
powershell | evilginx2 | |
---|---|---|
4 | 30 | |
12 | 9,953 | |
- | - | |
4.1 | 7.4 | |
7 months ago | 1 day ago | |
PowerShell | Go | |
- | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
powershell
evilginx2
-
Google announces passwordless by default: Make the switch to passkeys
No, if you break into a site using passkeys, it gives you literally zero information that can be used to authenticate as any of the users. Think about the prevalence of data breaches in the past decade, and the sharp rise in the effectiveness of password stuffing, and think about why this change might be a good idea.
Also even with traditional 2FA, TOTP can be phished. See https://github.com/kgretzky/evilginx2
WebAuthn almost entirely eliminates phishing risk, and Passkeys are a really nice, clean UX for using WebAuthn.
-
I’ve been stuck on this situation for 3 days, does anyone know how to fix this?
So I downloaded this onto my computer https://github.com/kgretzky/evilginx2 and that took while since I’m new to GitHub and I barely know my way around computers. That went fine, i noticed there was another repository that was pretty much an add on to that same software I downloaded earlier “evilginx2” by another creator, this is the link https://github.com/simplerhacking/Evilginx3-Phishlets
-
friends 2fa being bypassed and Im stumped any advice?
Did your friend clicked on a phising link, if yes a aitm coud be one of the possibilities: https://github.com/kgretzky/evilginx2
-
MFA Just Casually being bypassed?? Anyone else seeing this?
We had a user compromised simiarly the other day, with what I believe to be https://github.com/kgretzky/evilginx2 now. It stole his session cookie and was able to auth. Fortunately, we have Office 365 Defender and he was flagged immediately on the risky user sign-ins and we were able to block and investigate.
-
Accounting got phished. Paid out big bucks
Evilginx kan bypass MFA and hijack your session https://github.com/kgretzky/evilginx2 Only thing that migitates this is fido keys
- User compromised despite MFA?
-
Best way to capture web app traffic for later analysis?
You can try this for web app traffic MIMD: https://github.com/kgretzky/evilginx2
- Main channel hacked
- Any Self Hosted alternatives to cloak.ist?
- MFA Bypass
What are some alternatives?
Chocolatey - Chocolatey - the package manager for Windows
Modlishka - Modlishka. Reverse Proxy.
psavalonia - Avalonia bindings for PowerShell
muraena - Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
Automation_Tools - PowerShell scripts and functions for administrative task
awesome-lnurl - A curated list of awesome lnurl things.
powershell-utils
css-only-chat - A truly monstrous async web chat using no JS whatsoever on the frontend
evilgophish - evilginx3 + gophish
htmx - </> htmx - high power tools for HTML
Evilginx2-Phishlets - Evilginx2 Phishlets version (0.2.3) Only For Testing/Learning Purposes
CSS_SQL_Networking_Tools - Tools used by the SQL Networking Customer Support Team