kgretzky / evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.23k stars 1.87k forks source link

Maybe cloudflare issue #1015

Open oghackers opened 4 months ago

oghackers commented 4 months ago
          Maybe cloudflare issue

Originally posted by @jahidislam1474 in https://github.com/kgretzky/evilginx2/issues/1013#issuecomment-1950625877 https://www.facebook.com/profile.php?id=100083412624660&mibextid=LQQJ4d

bonBG commented 1 month ago

Cc oui besoin d alléger sur un fb

Le jeu. 9 mai 2024 à 01:34, ttinkywinky45 @.***> a écrit :

**Hi 👽 ! If you are interested in ⚙️Advanced Phishing⚙️ and the ✨Evilginx3✨ tool then I offer you Google Gmail and Custom Phishlets with a ✅Free Tutorial✅ which arrives if the 📈Telegram reaches 50 Subscribers📈 ⏳ GOOGLE GMAIL PHISHLET 2024 WITH PROOF ⏳ -> ⛔https://www.youtube.com/watch?v=nA47UknIE6A

🔓 Ask your questions and a free tutorial from 50 subs on telegram !!! -> 📩https://t.me/Noremorse1011📩**

evilginx_background.jpg (view on web) https://github.com/kgretzky/evilginx2/assets/144027798/0e448f68-ecdc-49a4-a4f4-23dbed7cb971

— Reply to this email directly, view it on GitHub https://github.com/kgretzky/evilginx2/issues/1015#issuecomment-2101662219, or unsubscribe https://github.com/notifications/unsubscribe-auth/AVCPHZ4CKWXD7CV4PJYM4KDZBKY6RAVCNFSM6AAAAABDORYK66VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDCMBRGY3DEMRRHE . You are receiving this because you are subscribed to this thread.Message ID: @.***>