Spoofy
Evilginx3-Phishlets
Spoofy | Evilginx3-Phishlets | |
---|---|---|
2 | 1 | |
542 | 348 | |
- | - | |
5.4 | 8.0 | |
2 months ago | 22 days ago | |
Python | ||
Creative Commons Zero v1.0 Universal | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Spoofy
Evilginx3-Phishlets
-
I’ve been stuck on this situation for 3 days, does anyone know how to fix this?
So I downloaded this onto my computer https://github.com/kgretzky/evilginx2 and that took while since I’m new to GitHub and I barely know my way around computers. That went fine, i noticed there was another repository that was pretty much an add on to that same software I downloaded earlier “evilginx2” by another creator, this is the link https://github.com/simplerhacking/Evilginx3-Phishlets
What are some alternatives?
vulnerable-code-snippets - Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.
evilginx2 - Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
SSTImap - Automatic SSTI detection and exploitation tool with interactive interface
RedTeam-Physical-Tools - Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
Sooty - The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
crimson - Web Application Security Testing Tools
mi-x - Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
blackhat_python_book_code - Source code and exercises from the book "Black Hat Python" by Justin Seitz.
Subdominator - The Internets #1 Subdomain Takeover Tool
Redeye - Redeye is a tool intended to help you manage your data during a pentest operation
trustymail - Scan domains and return data based on trustworthy email best practices