The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
Modlishka Alternatives
Similar projects and alternatives to Modlishka
-
evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
-
muraena
Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
bettercap
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
-
kubesploit
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
OnionFermenter
A tool for creating bitcoin stealing phishing clones of onion services on large scale
Modlishka reviews and mentions
- best phishing site or code for hacking insta
-
Browser in the Browser (BITB) Attack
I remember some big service many years ago (maybe yahoo?) had a “memorable image” or something that was associated with your username as some kind of anti phish metric. Of course nowadays that would be trivial to bypass with something like Modliskha or a different reverse proxy passing through the website content.
-
Even if hacker gets your password what good is it if the system flags suspicious logins cause of different IP address?
2FA can be "bypassed" by using some phishing and setup like https://github.com/drk1wi/Modlishka
- What's the fuss about 2FA with SMS?
-
2fa is hackable. Its pretty easy. Now what?
Apps would not help in this case. OTP, Push, SMS, Phone calls are all possible to be compromised using this attack (via reverse proxy for example).
-
Bad guys got into a 365 account with MFA enabled.
The MFA implemented in Azure is not phishing-proof. This can be phished using a reverse proxy, and the push notification method is often becoming a bad habit for users to always approve ("this was from Microsoft, so it looked legit"). The only phishing proof method is using FIDO2 authenticators, but that is Passwordless, not MFA
-
Azure MFA
Step 1. The user becomes a victim of an advanced phishing attack with MFA phishing included, so the attacker's phishing script logs in using both password and MFA code. Step 2. The attacker uses the session cookie to impersonate the victim. Step 3 is the same as with Option A.
-
Engineering a real-time phishing simulation proxy in Rust
* https://github.com/drk1wi/Modlishka
-
Social Engineering Toolkit (SET)
GitHub - drk1wi/Modlishka: Modlishka. Reverse Proxy.
-
Is hacking still an issue with 2FA?
See things like https://github.com/drk1wi/Modlishka
-
A note from our sponsor - WorkOS
workos.com | 19 Apr 2024
Stats
drk1wi/Modlishka is an open source project licensed under GNU General Public License v3.0 or later which is an OSI approved license.
The primary programming language of Modlishka is Go.