evilgophish
Red-Team-Infrastructure-Wiki
evilgophish | Red-Team-Infrastructure-Wiki | |
---|---|---|
20 | 3 | |
1,309 | 3,884 | |
- | - | |
10.0 | 1.2 | |
7 months ago | about 1 year ago | |
Go | ||
GNU General Public License v3.0 only | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
evilgophish
- Evilgophish Evilginx 3.0.0 Update
-
Phishing Infrastructure Resources?
https://github.com/fin3ss3g0d/evilgophish comes shipped with SMS phishing capabilities, and is a combination of gophish and evilginx2 with Apache2 proxy in front
-
You should probably disable WebUSB and WebBluetooth in Chrome
As part of this process, I started looking at the various avenues of attack that could bypass FIDO/FIDO2/U2F MFA style authentication. Previously I would use something like EvilGoPhish to phish employees/customers and steal their session cookies to bypass MFA but this does not work with U2F.
-
Phish a User with MFA Enabled
All evilginx2 fans checkout this project that provides campaign statistics for evilginx2 campaigns in the GoPhish dashboard and a real-time end-to-end encrypted feed https://github.com/fin3ss3g0d/evilgophish
- evilgophish - Phishing/Smishing Framework With Pusher End-To-End Encrypted Live Feed
- EvilPhish adds SMS campaign support via Twilio
- evilgophish Now Supports SMS Smishing Campaigns
Red-Team-Infrastructure-Wiki
-
Phishing Infrastructure Resources?
I found this as a useful starting point: https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki
- Some information and advice about DDoS, from someone who was there during #opPayback
-
logging into a raspberry pi
We have done it by connecting a Huawei LTE-Stick to a Raspberry Pi with Kali Linux. It automatically sets up a VPN connection to a control server in AWS where we have red teaming infrastructure set up. When we then connect the rpi into the network we can do some SSH port forwarding and connect to the rpi, which is now a network implant where we can do basically anything from. This sometimes requires finding Active Directory credentials around the office or through a phishing campaign (really easy with the access to the local network) or something, in order to get a foothold onto the AD infrastructure.
What are some alternatives?
evilginx2 - Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
gophish - Open-Source Phishing Toolkit
PhishDock - Automated Docker infrastructure with Gophish, Nginx Proxy Manager, Nginx and PHP
i2pd - 🛡 I2P: End-to-End encrypted and anonymous Internet
webusb - Connecting hardware to the web.
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers
Evilginx2-Phishlets - Evilginx2 Phishlets version (0.2.3) Only For Testing/Learning Purposes
gogophish - Fly into Gophish with One Click (Infra Automation)
sovereign - A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.
ScareCrow - ScareCrow - Payload creation framework designed around EDR bypass.
LOIC - Deprecated - Low Orbit Ion Cannon - An open source network stress tool, written in C#. Based on Praetox's LOIC project. USE ON YOUR OWN RISK. WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. IF YOU GET V& IT IS YOUR FAULT.