kgretzky / evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.22k stars 1.87k forks source link

js_inject not working for google #1054

Open Clsclear opened 2 months ago

Clsclear commented 2 months ago

Issue Description:

When utilizing js_inject for google.com, the JavaScript injection into the body does not occur. However, sub_filters functions as expected and effectively replaces any content as intended. The JavaScript part in the code below is just an example

Clsclear commented 2 months ago

Issued Fixed!

Solution:

In phishlets.go change

re, err := regexp.Compile("^" + d + "$")

to

re, err := regexp.Compile(d)

Dgoat201 commented 1 month ago

Send msg to @h0x07 on telegram for fix.

Clsclear commented 1 month ago

Did you read the post? I said it's fixed

On Tue, May 7, 2024, 3:40 PM Dgoat201 @.***> wrote:

Send msg to @h0x07 on telegram for fix.

— Reply to this email directly, view it on GitHub https://github.com/kgretzky/evilginx2/issues/1054#issuecomment-2098756084, or unsubscribe https://github.com/notifications/unsubscribe-auth/BIGRH4WKA55VYRVKSZPRDCTZBDYVJAVCNFSM6AAAAABHBUZCH6VHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDAOJYG42TMMBYGQ . You are receiving this because you authored the thread.Message ID: @.***>

Dgoat201 commented 1 month ago

Check this phishing tool https://t.me/nextgenerationphishin