1. Evilginx Mastery

    • Buy now
    • Learn more
    • Thank You
  2. Introduction

    • Intro
    • Evolution of Phishing
    • MFA & Web Security
    • Stealing The Token
  3. Setup

    • Intro
    • Preparing The Environment
    • Training Lab
  4. Getting Started

    • Intro
    • Creating a Phishlet
    • Catching Phish
    • Personalizing Lures
  5. Advanced Phishing

    • Intro
    • Replacing Content
    • Forcing POST Parameters
    • Handling JSON & LocalStorage
    • JavaScript Injection
    • Landing Page Redirectors
    • Mass Lure Targeting
    • Proxying The Reverse Proxy
    • Blacklist Management
  6. Security Hardening

    • Intro
    • Location Validation
    • Secret Token Validation
  7. Remote Deployment

    • Intro
    • Set Up Your Server
    • Domain Setup
    • Deploy Evilginx
    • Remote Phishing
    • Persistence
  8. Deep Sea Phishing

    • Intro
    • Okta: Defeating Protections
    • Okta: Session Tokens
    • Okta: Phishlet Templates
    • Microsoft 365 Personal - Creating a Phishlet
    • Microsoft 365 Personal - Cleaning Up
    • Microsoft 365 Enterprise - Adding Compatibility
  1. Products
  2. Course
  3. Section
  4. Lesson

Intro

  1. Evilginx Mastery

    • Buy now
    • Learn more
    • Thank You
  2. Introduction

    • Intro
    • Evolution of Phishing
    • MFA & Web Security
    • Stealing The Token
  3. Setup

    • Intro
    • Preparing The Environment
    • Training Lab
  4. Getting Started

    • Intro
    • Creating a Phishlet
    • Catching Phish
    • Personalizing Lures
  5. Advanced Phishing

    • Intro
    • Replacing Content
    • Forcing POST Parameters
    • Handling JSON & LocalStorage
    • JavaScript Injection
    • Landing Page Redirectors
    • Mass Lure Targeting
    • Proxying The Reverse Proxy
    • Blacklist Management
  6. Security Hardening

    • Intro
    • Location Validation
    • Secret Token Validation
  7. Remote Deployment

    • Intro
    • Set Up Your Server
    • Domain Setup
    • Deploy Evilginx
    • Remote Phishing
    • Persistence
  8. Deep Sea Phishing

    • Intro
    • Okta: Defeating Protections
    • Okta: Session Tokens
    • Okta: Phishlet Templates
    • Microsoft 365 Personal - Creating a Phishlet
    • Microsoft 365 Personal - Cleaning Up
    • Microsoft 365 Enterprise - Adding Compatibility