Modlishka
muraena
Modlishka | muraena | |
---|---|---|
11 | 3 | |
4,672 | 850 | |
- | 0.7% | |
6.0 | 8.1 | |
13 days ago | 28 days ago | |
Go | Go | |
GNU General Public License v3.0 or later | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Modlishka
- best phishing site or code for hacking insta
-
Browser in the Browser (BITB) Attack
I remember some big service many years ago (maybe yahoo?) had a “memorable image” or something that was associated with your username as some kind of anti phish metric. Of course nowadays that would be trivial to bypass with something like Modliskha or a different reverse proxy passing through the website content.
https://github.com/drk1wi/Modlishka
-
Even if hacker gets your password what good is it if the system flags suspicious logins cause of different IP address?
2FA can be "bypassed" by using some phishing and setup like https://github.com/drk1wi/Modlishka
- What's the fuss about 2FA with SMS?
-
2fa is hackable. Its pretty easy. Now what?
Apps would not help in this case. OTP, Push, SMS, Phone calls are all possible to be compromised using this attack (via reverse proxy for example).
-
Bad guys got into a 365 account with MFA enabled.
The MFA implemented in Azure is not phishing-proof. This can be phished using a reverse proxy, and the push notification method is often becoming a bad habit for users to always approve ("this was from Microsoft, so it looked legit"). The only phishing proof method is using FIDO2 authenticators, but that is Passwordless, not MFA
-
Azure MFA
Step 1. The user becomes a victim of an advanced phishing attack with MFA phishing included, so the attacker's phishing script logs in using both password and MFA code. Step 2. The attacker uses the session cookie to impersonate the victim. Step 3 is the same as with Option A.
-
Engineering a real-time phishing simulation proxy in Rust
* https://github.com/drk1wi/Modlishka
-
Social Engineering Toolkit (SET)
GitHub - drk1wi/Modlishka: Modlishka. Reverse Proxy.
-
Is hacking still an issue with 2FA?
See things like https://github.com/drk1wi/Modlishka
muraena
- What's the fuss about 2FA with SMS?
-
Minecraft account migration might makes security worse
Hello there people of the craft! I'm concerned about the account migration not being the digital heaven dinnerbone has announced, While moving the accounts to the microsoft data seems safer at first, there is a few reasons this can be quite bad news, and this feels like when we were forced to have a google+ accounts. First off, what is technically better with the new authentification system? Like really, expect the chance of microsoft randomly locking your account because you didn't got your password right the first time, what's so great? A anti password brute force system? We already had that with mojang I believe. And it is not like a lot of accounts are hacked using this system anyways, phishing is actually much more used ( where the attacker trick you with a fake email from mojang, and a link going to a fake login that collect your password when you enter it ). But luckily we will have two-factor authentication to PROTECT US ALL from the dangerous local rusian hacker who desperately wants to steal your minecraft account! Cheese and crackers! 2FA doesn't protect you from that ( check out muraena and necrobrowser to see how that's done ). 2FA is almost worthless, just another process to help the microsoft foundation get more of your personal data.
-
Engineering a real-time phishing simulation proxy in Rust
* https://github.com/muraenateam/muraena
What are some alternatives?
evilginx2 - Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
necrobrowser - necromantic session control
CDK - 📦 Make security testing of K8s, Docker, and Containerd easier.
WeaponizeKali.sh - Automate installation of extra pentest tools on Kali Linux
broxy - An HTTP/HTTPS intercept proxy written in Go.
kubesploit - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
proto-find - Let's check if your target is vulnerable for client side prototype pollution.
OnionFermenter - A tool for creating bitcoin stealing phishing clones of onion services on large scale
dnstwist - A tool to monitor for potential spear phishing domains and send to Slack.