evilginx Profile Banner
Evilginx Profile
Evilginx

@evilginx

Followers
819
Following
38
Media
2
Statuses
35

I am the evil bot capturing your MFA tokens. Offensive security reverse-proxy phishing framework capable of bypassing MFA protections, created by @mrgretzky

Joined May 2018
Don't wanna be here? Send us removal request.
@evilginx
Evilginx
2 years
I approve this message! 🪝🐟
@_JohnHammond
John Hammond
2 years
Session hijacking a Microsoft 365 account! Stealing their credentials and bypassing MFA prompt with Evilginx: a reverse-proxy phishing framework! We stage a phishing domain and email pretense, and gain full access to the victim account! https://t.co/E29wB0yNXt
0
0
10
@reybango
Rey Bango 🇺🇦🌻
24 days
Black Friday and Cyber Monday deals are out! I review some of them and link to a community GitHub page for you all to get discounts on courses, tools and services! Deals from @_RastaMouse, @_JohnHammond, @offsectraining, @evilginx, @Antisy_Training and a whole lot more.
1
4
11
@dan1t0
☠ Dani Martinez ☠
3 months
🚨 "Working With Evilginx On-Premises" For projects where OPSEC is critical: keep sensitive data on your server, use cloud only for redirectors. Architecture: Cloudflare → Caddy → Evilginx (on-prem via Tailnet) https://t.co/ZNd8CuHKwI @evilginx @mrgretzky #Phishing #OPSEC
0
17
58
@evilginx
Evilginx
7 months
The official MFA phishing anthem! 🍪💗🎵
@uwu_underground
UwU Underground
7 months
🎵🎧 .lıllılı.ıllı.ılılıılıı.lllııılı. UwU Underground Now Playing: [I Stole Your MFA] 0:44 ———♡———1:52 ◁◁ ▐ ▌ ▷▷ Get Psyopped By New Music, Mammals
0
1
4
@mrgretzky
Kuba Gretzky
1 year
🚨 The Black Friday sale is coming! The sale drops at midnight today! (UTC+1) It will be the biggest sale yet! 🤩
1
9
51
@evilginx
Evilginx
1 year
Black Friday is on 29th November this year. Just sayin'... 🤫
3
3
12
@DeanOfCyber
Tarek
2 years
Black hat Asia training is completed. Two days of sharing with our students how APTs compromise AD and Entra ID. And I couldn't help but give a quick shout-out to @evilginx Next stop is @x33fcon & I'm looking forward to it!
1
2
8
@mrgretzky
Kuba Gretzky
2 years
Merry Christmas everyone! ❄️☃️🎄 Wish you all the best and thank you for a great year! ✨️
@vxunderground
vx-underground
2 years
Our friend @mrgretzky hooked us up with 12 Evilginx Mastery courses - making it the 12 days of Evilginx Xmas:) Course details: https://t.co/Q8WnhHQpwM Comment below for a chance to win.
3
5
98
@mrgretzky
Kuba Gretzky
2 years
🚨 BLACK FRIDAY Evilginx Mastery -40% SALE 🚨 👑 40% discount (biggest yet!) ⏰ Only 24 hours Code: BLACKFRIDAY40SALE Link: https://t.co/XxQ1SO8N3t Hurry! It's active only until tomorrow!
11
48
102
@mrgretzky
Kuba Gretzky
2 years
🚨 Evilginx Mastery Black Friday SALE is coming... tomorrow! 🔥 It will be the BIGGEST sale so far! 🤩 ⏰ Sale will last only 24 hours.
4
16
94
@spopalzai
Shaheryar Popalzai
2 years
The @evilginx Mastery course is way too much fun 👀
1
2
12
@SwiftOnSecurity
SwiftOnSecurity
2 years
The purpose of SMS/Push/# matching MFA was to put you past most victims and thus most toolsets. There was a point you were basically immune with legacy protocols turned off in Exchange. Now that stronger methods are normalized, attackers are targeting their weaknesses. Not done.
@_JohnHammond
John Hammond
2 years
Session hijacking a Microsoft 365 account! Stealing their credentials and bypassing MFA prompt with Evilginx: a reverse-proxy phishing framework! We stage a phishing domain and email pretense, and gain full access to the victim account! https://t.co/E29wB0yNXt
9
65
441
@_JohnHammond
John Hammond
2 years
Session hijacking a Microsoft 365 account! Stealing their credentials and bypassing MFA prompt with Evilginx: a reverse-proxy phishing framework! We stage a phishing domain and email pretense, and gain full access to the victim account! https://t.co/E29wB0yNXt
24
304
2K
@mrgretzky
Kuba Gretzky
2 years
🚨 The big reveal of Evilginx Pro is finally OUT! 🚨 📔From this blog post you will learn what makes the Pro version different from the community one. 🎟️I explain how Evilpuppet secret token extraction works and showcase the core features. Enjoy! 🪝🐟 https://t.co/kQyxOOiODI
Tweet card summary image
breakdev.org
I've teased the idea of Evilginx Pro long enough and I think it is finally time to make a proper reveal of what it exactly is. Evilginx Pro will be a paid professional version of Evilginx, with extra...
10
73
210
@mrgretzky
Kuba Gretzky
2 years
🎬Phishing LinkedIn and bypassing MFA demo created for the upcoming Evilginx Pro post 🔥 💡Evilginx uses a background browser to capture the secret token from legitimate website and inject it back into the reverse proxy phishing session. P.S. Enjoy that Cyberpunk tune I made 🎵
8
114
462
@mrgretzky
Kuba Gretzky
2 years
Patch to add custom DNS records in running instance of Evilginx made by @ojensen5115 🔥 This is getting added for good in upcoming updates.
0
4
19
@mrgretzky
Kuba Gretzky
2 years
🚨BREAKING: Evilginx 3.2 is OUT! 🪝🐟 To celebrate the release of the new update, here is the special 10% discount code for the Evilginx Mastery course! 🎁Code: EVILGINX32 (valid until 31st Aug) 🔗Link: https://t.co/C5XxroUn7C https://t.co/wIZx2HlxCU
Tweet card summary image
breakdev.org
The new free update for the Evilginx phishing framework is OUT NOW! Enjoy the new features and improvements!
0
67
159
@mrgretzky
Kuba Gretzky
2 years
Finally my talk from @x33fcon is online! 🔥 I try my best to explain what websites could do to protect the users against reverse proxy phishing attacks like Evilginx.🪝🐟 There is also a bonus live demo at the end with some Evilginx Pro secret sauce! 💡 https://t.co/fXZ0TXfK5m
4
77
220
@mrgretzky
Kuba Gretzky
2 years
🎁 Who is excited for Evilginx 3.2 release NEXT WEEK? 🔥 One of the new features is the ability to pause your lures for fixed time duration. Useful if you want to prevent your lure URLs from being scanned right after you send them out or if you want to lay low for a day or two.
1
35
136
@mrgretzky
Kuba Gretzky
2 years
Override global redirect URL for each phishlet separately in the upcoming Evilginx 3.2 update 🔥 More features to come as well! Huge thanks to @0x_aalex for pitching this idea in his PR on GitHub.
0
10
42