Skip to content

Evilginx3 Phishlets Wiki

simplerhacking edited this page Oct 30, 2023 · 1 revision

Welcome to the Evilginx3-Phishlets wiki!

Evilginx 3 Phishlets Github Repository Wiki

Table of Contents

  1. Introduction
  2. Usage
  3. Creating a Phishlet
  4. Setting up a Phishlet
  5. Debugging
  6. Common Issues
  7. Conclusion
  8. Disclaimers & Legal

1. Introduction

This is the repository on Phishlets for Evilginx 3 from Simpler Hacking, which is an advanced open-source phishing attack framework that allows you to steal session cookies and bypass two-factor authentication. It uses customizable phishlets which are text files in YAML format.

Before moving forward, it's critical to highlight the legal implications associated with Evilginx usage. It should be used responsibly, for legal, authorized penetration testing and security research use cases only. Improper usage may result in legal consequences.

2. Usage

To start using Evilginx:

evilginx -p ./phishlets/

./phishlets/ directory.

3. Creating a Phishlet

These took me a while to make.

A Phishlet is basically a YAML formatted configuration file that defines how the attack will be performed. You'll need to outline the original website and setup for capturing credentials and sessions cookies. Refer to the provided sample Phishlets in my other Github repositories to understand their structure and create your own.

Or consider enrolling in our comprehensive Evilginx Pro Masterclass Video Series on www.simplerhacking.com

outlook cookie grab Evilginx Pro Masterclass Course Preview

4. Setting up a Phishlet

To set up a Phishlet, use the following commands:

evilginx> phishlets hostname [phishlet] [hostname]

5. Debugging

For debugging, use the -debug switch:

evilginx -p ./phishlets/ -debug

This will provide verbose output to help diagnose issues.

6. Common Issues

If you can't find a solution, feel free to raise a new issue with detailed explanations of your problem.

7. Conclusion

Remember, Evilginx 3 is powerful tool and is intended for use by professional security researchers. Be ethical in the activities you undertake with it.

8. Disclaimers & Legal

This tool is provided for educational and legal purposes. It can only be used where strict consent has been given. Do not use this tool for illegal activities and we do not take responsibility for any misuse of this tool.

Thank you to @kgretzky for creating this tool!