kgretzky / evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.72k stars 1.94k forks source link

running error #1105

Open a725970 opened 1 month ago

a725970 commented 1 month ago

DO NOT ASK FOR PHISHLETS.

DO NOT ASK FOR HELP CREATING PHISHLETS.

DO NOT ASK TO FIX PHISHLETS.

DO NOT ADVERTISE OR TRY TO SELL PHISHLETS.

EXPECT A BAN OTHERWISE. THANK YOU!

REPORT ONLY BUGS OR FEATURE SUGGESTIONS.

when running

goroutine 26867 [running] github.com/inconshreveable/go-vhost.readClientHello(0xadfd00?0xc0001c2780?} /rootevilginx2/vendor/github.com/inconshreveable/go-vost/tos.go:259+0x2f5 ... .. ..

a725970 commented 1 month ago

sssss

itsdayztar1 commented 3 weeks ago

telegram itsdayztar