muraena
evilginx2
muraena | evilginx2 | |
---|---|---|
3 | 30 | |
857 | 9,979 | |
1.2% | - | |
8.1 | 7.4 | |
about 1 month ago | 7 days ago | |
Go | Go | |
BSD 3-clause "New" or "Revised" License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
muraena
- What's the fuss about 2FA with SMS?
-
Minecraft account migration might makes security worse
Hello there people of the craft! I'm concerned about the account migration not being the digital heaven dinnerbone has announced, While moving the accounts to the microsoft data seems safer at first, there is a few reasons this can be quite bad news, and this feels like when we were forced to have a google+ accounts. First off, what is technically better with the new authentification system? Like really, expect the chance of microsoft randomly locking your account because you didn't got your password right the first time, what's so great? A anti password brute force system? We already had that with mojang I believe. And it is not like a lot of accounts are hacked using this system anyways, phishing is actually much more used ( where the attacker trick you with a fake email from mojang, and a link going to a fake login that collect your password when you enter it ). But luckily we will have two-factor authentication to PROTECT US ALL from the dangerous local rusian hacker who desperately wants to steal your minecraft account! Cheese and crackers! 2FA doesn't protect you from that ( check out muraena and necrobrowser to see how that's done ). 2FA is almost worthless, just another process to help the microsoft foundation get more of your personal data.
-
Engineering a real-time phishing simulation proxy in Rust
* https://github.com/muraenateam/muraena
evilginx2
-
Google announces passwordless by default: Make the switch to passkeys
No, if you break into a site using passkeys, it gives you literally zero information that can be used to authenticate as any of the users. Think about the prevalence of data breaches in the past decade, and the sharp rise in the effectiveness of password stuffing, and think about why this change might be a good idea.
Also even with traditional 2FA, TOTP can be phished. See https://github.com/kgretzky/evilginx2
WebAuthn almost entirely eliminates phishing risk, and Passkeys are a really nice, clean UX for using WebAuthn.
-
I’ve been stuck on this situation for 3 days, does anyone know how to fix this?
So I downloaded this onto my computer https://github.com/kgretzky/evilginx2 and that took while since I’m new to GitHub and I barely know my way around computers. That went fine, i noticed there was another repository that was pretty much an add on to that same software I downloaded earlier “evilginx2” by another creator, this is the link https://github.com/simplerhacking/Evilginx3-Phishlets
-
friends 2fa being bypassed and Im stumped any advice?
Did your friend clicked on a phising link, if yes a aitm coud be one of the possibilities: https://github.com/kgretzky/evilginx2
-
MFA Just Casually being bypassed?? Anyone else seeing this?
We had a user compromised simiarly the other day, with what I believe to be https://github.com/kgretzky/evilginx2 now. It stole his session cookie and was able to auth. Fortunately, we have Office 365 Defender and he was flagged immediately on the risky user sign-ins and we were able to block and investigate.
-
Accounting got phished. Paid out big bucks
Evilginx kan bypass MFA and hijack your session https://github.com/kgretzky/evilginx2 Only thing that migitates this is fido keys
- User compromised despite MFA?
-
Best way to capture web app traffic for later analysis?
You can try this for web app traffic MIMD: https://github.com/kgretzky/evilginx2
- Main channel hacked
- Any Self Hosted alternatives to cloak.ist?
- MFA Bypass
What are some alternatives?
necrobrowser - necromantic session control
Modlishka - Modlishka. Reverse Proxy.
awesome-lnurl - A curated list of awesome lnurl things.
css-only-chat - A truly monstrous async web chat using no JS whatsoever on the frontend
evilgophish - evilginx3 + gophish
htmx - </> htmx - high power tools for HTML
Evilginx2-Phishlets - Evilginx2 Phishlets version (0.2.3) Only For Testing/Learning Purposes
CSS_SQL_Networking_Tools - Tools used by the SQL Networking Customer Support Team
Evilginx3-Phishlets - This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically for use with Evilginx3.
passkey-rs - A framework for defining Webauthn Authenticators that support passkeys
KeePass2.x - unofficial mirror of KeePass2.x source code