evilginx2
dnstwist
evilginx2 | dnstwist | |
---|---|---|
30 | 23 | |
10,010 | 4,584 | |
- | - | |
7.4 | 7.6 | |
6 days ago | about 2 months ago | |
Go | Python | |
BSD 3-clause "New" or "Revised" License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
evilginx2
-
Google announces passwordless by default: Make the switch to passkeys
No, if you break into a site using passkeys, it gives you literally zero information that can be used to authenticate as any of the users. Think about the prevalence of data breaches in the past decade, and the sharp rise in the effectiveness of password stuffing, and think about why this change might be a good idea.
Also even with traditional 2FA, TOTP can be phished. See https://github.com/kgretzky/evilginx2
WebAuthn almost entirely eliminates phishing risk, and Passkeys are a really nice, clean UX for using WebAuthn.
-
I’ve been stuck on this situation for 3 days, does anyone know how to fix this?
So I downloaded this onto my computer https://github.com/kgretzky/evilginx2 and that took while since I’m new to GitHub and I barely know my way around computers. That went fine, i noticed there was another repository that was pretty much an add on to that same software I downloaded earlier “evilginx2” by another creator, this is the link https://github.com/simplerhacking/Evilginx3-Phishlets
-
friends 2fa being bypassed and Im stumped any advice?
Did your friend clicked on a phising link, if yes a aitm coud be one of the possibilities: https://github.com/kgretzky/evilginx2
-
MFA Just Casually being bypassed?? Anyone else seeing this?
We had a user compromised simiarly the other day, with what I believe to be https://github.com/kgretzky/evilginx2 now. It stole his session cookie and was able to auth. Fortunately, we have Office 365 Defender and he was flagged immediately on the risky user sign-ins and we were able to block and investigate.
-
Accounting got phished. Paid out big bucks
Evilginx kan bypass MFA and hijack your session https://github.com/kgretzky/evilginx2 Only thing that migitates this is fido keys
- User compromised despite MFA?
-
Best way to capture web app traffic for later analysis?
You can try this for web app traffic MIMD: https://github.com/kgretzky/evilginx2
- Main channel hacked
- Any Self Hosted alternatives to cloak.ist?
- MFA Bypass
dnstwist
- Have I Been Squatted?
-
Domain Permutation - HaveIBeenSquatted & dnstwist
I recently stumbled upon 2 cool domain permutation tools: HIBS & dnstwist
-
Accounting got phished. Paid out big bucks
https://dnstwist.it/ - check your domain now
-
Phishing campaign defence advice
You can hunt down evil twin domains with https://dnstwist.it/
- adjacent domain names
- Alternative To Domain Tools
-
Typosquatting list
I periodically run dnstwist and add whatever it finds to our block list.
- List of 26 services for OSINT | BLUE TEAMS | RED TEAMS
-
God damn. In situations like this how can I detect the fake one? This is truly scary.
Pi-hole (with every reasonable blocklist I can find) protects me from many of these domains. NextDNS would be another option for DNS-based blocking for people who don't want to administer it themselves. I also plan to use DNSTwist to generate additional blocklists for typo-based phishing that I can plug into the Pi-hole for important sites.
- Google Search Ads showing fake bitwarden web vault site as top result.
What are some alternatives?
Modlishka - Modlishka. Reverse Proxy.
opensquat - The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonating legit domains.
muraena - Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
dnschef - DNSChef - DNS proxy for Penetration Testers and Malware Analysts
awesome-lnurl - A curated list of awesome lnurl things.
urlcrazy - Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
css-only-chat - A truly monstrous async web chat using no JS whatsoever on the frontend
octoDNS - Tools for managing DNS across multiple providers
evilgophish - evilginx3 + gophish
amass - In-depth attack surface mapping and asset discovery
htmx - </> htmx - high power tools for HTML
WhatBreach - OSINT tool to find breached emails, databases, pastes, and relevant information