Phishing Attacks With Evilginx2

PHISHING ATTACKS WITH EVILGINX2 This blog post was written by Varun Gupta. IntroductionEvilginx2 is an attack framework for setting up phishing pages. Instead of serving templates of sign-in pages look-alikes, Evilginx2 becomes a relay (proxy) between the real website and the phished user. Phished user interacts with the real [...]

By |2021-07-28T15:04:46+03:00January 25th, 2021|Offensive Security, Penetration Testing, Red Teaming|

Hacking Android Phones With Malicious APK

HACKING ANDROID PHONES WITH MALICIOUS APK This blog post was written by Rodney Kariuki. Introduction It is possible to exploit the actual android device of a user by installing malicious payloads on their phones in form of Android Application Packages (APKs), or by trojanizing a legitimate application. [...]

By |2021-01-21T10:39:29+03:00January 19th, 2021|Offensive Security, Penetration Testing, Red Teaming|
Go to Top