kgretzky / evilginx2

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
BSD 3-Clause "New" or "Revised" License
10.26k stars 1.87k forks source link

Does not work with newest version 3.2 #962

Closed Johnnycage7734 closed 9 months ago

Johnnycage7734 commented 9 months ago

DO NOT ASK FOR PHISHLETS.

DO NOT ASK FOR HELP CREATING PHISHLETS.

DO NOT ASK TO FIX PHISHLETS.

DO NOT ADVERTISE OR TRY TO SELL PHISHLETS.

EXPECT A BAN OTHERWISE. THANK YOU!

REPORT ONLY BUGS OR FEATURE SUGGESTIONS.

I’ve tried the majority of these phishlets and I haven’t found not ONE that works in the latest Evilginx update. He added in the “readme” that you need to modify the evilginx3 source code to be able to support these phishlets and gives you the line you need to modify, but, line 909(as described in the “readme” isn’t even there, it’s a completely different line of code there. Could anyone share some tips on how they got them to work? (If anyone has) doesn’t seem like the author is here much to offer support. The problem I’m having with these phishlets is, as soon as I load into the url, it’s either outdated or there’s significant things missing like the webpage logo, or the page has no pictures, icons, OR, the page won’t let you type anything in, this rendering it useless.