Modlishka
evilginx2
Modlishka | evilginx2 | |
---|---|---|
11 | 30 | |
4,672 | 9,912 | |
- | - | |
6.0 | 7.4 | |
13 days ago | 8 days ago | |
Go | Go | |
GNU General Public License v3.0 or later | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Modlishka
- best phishing site or code for hacking insta
-
Browser in the Browser (BITB) Attack
I remember some big service many years ago (maybe yahoo?) had a “memorable image” or something that was associated with your username as some kind of anti phish metric. Of course nowadays that would be trivial to bypass with something like Modliskha or a different reverse proxy passing through the website content.
https://github.com/drk1wi/Modlishka
-
Even if hacker gets your password what good is it if the system flags suspicious logins cause of different IP address?
2FA can be "bypassed" by using some phishing and setup like https://github.com/drk1wi/Modlishka
- What's the fuss about 2FA with SMS?
-
2fa is hackable. Its pretty easy. Now what?
Apps would not help in this case. OTP, Push, SMS, Phone calls are all possible to be compromised using this attack (via reverse proxy for example).
-
Bad guys got into a 365 account with MFA enabled.
The MFA implemented in Azure is not phishing-proof. This can be phished using a reverse proxy, and the push notification method is often becoming a bad habit for users to always approve ("this was from Microsoft, so it looked legit"). The only phishing proof method is using FIDO2 authenticators, but that is Passwordless, not MFA
-
Azure MFA
Step 1. The user becomes a victim of an advanced phishing attack with MFA phishing included, so the attacker's phishing script logs in using both password and MFA code. Step 2. The attacker uses the session cookie to impersonate the victim. Step 3 is the same as with Option A.
-
Engineering a real-time phishing simulation proxy in Rust
* https://github.com/drk1wi/Modlishka
-
Social Engineering Toolkit (SET)
GitHub - drk1wi/Modlishka: Modlishka. Reverse Proxy.
-
Is hacking still an issue with 2FA?
See things like https://github.com/drk1wi/Modlishka
evilginx2
-
Google announces passwordless by default: Make the switch to passkeys
No, if you break into a site using passkeys, it gives you literally zero information that can be used to authenticate as any of the users. Think about the prevalence of data breaches in the past decade, and the sharp rise in the effectiveness of password stuffing, and think about why this change might be a good idea.
Also even with traditional 2FA, TOTP can be phished. See https://github.com/kgretzky/evilginx2
WebAuthn almost entirely eliminates phishing risk, and Passkeys are a really nice, clean UX for using WebAuthn.
-
I’ve been stuck on this situation for 3 days, does anyone know how to fix this?
So I downloaded this onto my computer https://github.com/kgretzky/evilginx2 and that took while since I’m new to GitHub and I barely know my way around computers. That went fine, i noticed there was another repository that was pretty much an add on to that same software I downloaded earlier “evilginx2” by another creator, this is the link https://github.com/simplerhacking/Evilginx3-Phishlets
-
friends 2fa being bypassed and Im stumped any advice?
Did your friend clicked on a phising link, if yes a aitm coud be one of the possibilities: https://github.com/kgretzky/evilginx2
-
MFA Just Casually being bypassed?? Anyone else seeing this?
We had a user compromised simiarly the other day, with what I believe to be https://github.com/kgretzky/evilginx2 now. It stole his session cookie and was able to auth. Fortunately, we have Office 365 Defender and he was flagged immediately on the risky user sign-ins and we were able to block and investigate.
-
Accounting got phished. Paid out big bucks
Evilginx kan bypass MFA and hijack your session https://github.com/kgretzky/evilginx2 Only thing that migitates this is fido keys
- User compromised despite MFA?
-
Best way to capture web app traffic for later analysis?
You can try this for web app traffic MIMD: https://github.com/kgretzky/evilginx2
- Main channel hacked
- Any Self Hosted alternatives to cloak.ist?
- MFA Bypass
What are some alternatives?
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
muraena - Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
awesome-lnurl - A curated list of awesome lnurl things.
CDK - 📦 Make security testing of K8s, Docker, and Containerd easier.
css-only-chat - A truly monstrous async web chat using no JS whatsoever on the frontend
WeaponizeKali.sh - Automate installation of extra pentest tools on Kali Linux
evilgophish - evilginx3 + gophish
broxy - An HTTP/HTTPS intercept proxy written in Go.
htmx - </> htmx - high power tools for HTML
kubesploit - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Evilginx2-Phishlets - Evilginx2 Phishlets version (0.2.3) Only For Testing/Learning Purposes