Social Engineeringphishingmitm2fabypasscredentialssessionhijacking

evilginx2

Man-in-the-middle attack framework for phishing login credentials and session cookies to bypass 2-factor authentication. Successor to Evilginx, fully rewritten in Go with built-in HTTP and DNS servers for easy setup.

Description

evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which allows attackers to bypass 2-factor authentication protection. This tool is particularly effective for targeting authentication systems that rely on both passwords and secondary factors like TOTP or push notifications.

As the successor to the original Evilginx released in 2017, evilginx2 replaces the custom nginx-based proxy with a fully standalone Go application. It implements its own HTTP and DNS servers, making it extremely easy to set up and use without external dependencies.

The framework proxies traffic between victims' browsers and legitimate websites while capturing both credentials and session tokens. This enables persistent access even after the victim changes their password or revokes sessions.

How It Works

evilginx2 operates as a reverse proxy with built-in HTTP and DNS servers. It acts as a man-in-the-middle between the victim's browser and the target website, intercepting login credentials and session cookies during the authentication process. By capturing valid session tokens alongside credentials, it bypasses 2FA protections since the stolen session remains valid server-side. The Go implementation eliminates nginx dependencies, providing a self-contained solution with custom certificate handling.

Installation

bash
sudo apt install evilginx2

Flags

-c stringConfiguration directory path
-debugEnable debug output
-developerEnable developer mode (generates self-signed certificates for all hostnames)
-p stringPhishlets directory path

Examples

Display help and usage information for all available flags
evilginx2 -h
Run evilginx2 with debug output enabled for troubleshooting
evilginx2 -debug
Start in developer mode with self-signed certificates for all hostnames
evilginx2 -developer
Specify custom configuration directory path
evilginx2 -c /path/to/config
Use custom phishlets directory for phishing templates
evilginx2 -p /path/to/phishlets
Run in developer mode with debug output for testing
evilginx2 -debug -developer
Updated 2026-04-16kali.org ↗