Skip to content

Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..

License

Notifications You must be signed in to change notification settings

froyo75/docker-evilginx2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Docker container for running Evilginx2

Evilginx2 - Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication protection.

This container runs without any IOCs or Evilginx Eggs + custom IP blacklist to block access to vendor sandboxes (Original from YCSM)

Usage

Start/Stop Evilginx2 container

cd ./docker-evilginx2
docker-compose up -d
docker-compose down

Get a bash shell in the container

docker exec -it evilginx2 /bin/bash

Run Evilginx2 in the running container using developer and debug mode

bash-5.1# evilginx -p /app/phishlets/ -developer -debug

Evilginx2 Config

./docker-evilginx2/app/

Display Evilginx2 container logs

docker logs evilginx2

Clean up unused images

docker image prune -f

Remove all containers + images (clean install)

./docker-evilginx2/clean.sh

About

Custom Evilginx2 Docker container without any IOCs or Evilginx Eggs..

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published