-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hey great project. #16
Comments
Hi @ssl-user-en, thanks! The tool is currently under active development. I started developing it two weeks ago after experiencing the limitations of evilginx2. The main focus is on the following things:
I use the following technical features to achieve this goal:
I haven't written a tutorial on how to use the tool yet, but I will when I make the first fully working version. I hope to complete it in the next few days. Stay tuned! |
Hey glad to hear that, I'd be happy to contribute in configs for your. Also do check out the tool cipherginx on github. It is doing some interesting things and features you can add in your tool. It injects hosts on the fly in the requests which is really helpful. |
Awesome! I will examine the source code of the cipherginx. But could you please elaborate on what you mean by injecting hosts on the fly ? |
It uses original Host Header Injection so that the server responds in a correct manner. You can test the tool so that you understand what i am trying to say. |
Hey @ssl-user-en this is a good stuff you got going, and is it ready yet. |
Hi @Jn39, actually yes, I have already tested my tool on some popular platforms with enabled 2FA and it works fine. I just need to take some time to document the instructions on how to use it. |
Great! can't wait
…On Wed, Jun 1, 2022 at 6:27 PM v-byte-cpu ***@***.***> wrote:
Hi @Jn39 <https://github.com/Jn39>, actually yes, I have already tested
my tool on some popular platforms with enabled 2FA and it works fine. I
just need to take some time to document the instructions on how to use it.
—
Reply to this email directly, view it on GitHub
<#16 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AQTKZME2IIK7HT5LXHEH3IDVM6MPTANCNFSM5B5PJ6BQ>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Also can u add a telegram web hook on a successful Oauth |
hey it's been months. we still waiting and hopeful |
guys, sorry for the delay, I will try to update the project next weekend |
is there a way we could reach u? |
Also can u add a telegram web hook on a successful Oauth
On Wed, Jun 1, 2022 at 11:07 PM Megan Jennie ***@***.***>
wrote:
… Great! can't wait
On Wed, Jun 1, 2022 at 6:27 PM v-byte-cpu ***@***.***>
wrote:
> Hi @Jn39 <https://github.com/Jn39>, actually yes, I have already tested
> my tool on some popular platforms with enabled 2FA and it works fine. I
> just need to take some time to document the instructions on how to use it.
>
> —
> Reply to this email directly, view it on GitHub
> <#16 (comment)>,
> or unsubscribe
> <https://github.com/notifications/unsubscribe-auth/AQTKZME2IIK7HT5LXHEH3IDVM6MPTANCNFSM5B5PJ6BQ>
> .
> You are receiving this because you were mentioned.Message ID:
> ***@***.***>
>
|
Video tutorial ready? |
Hey this is a great tool. I was wondering if there are any tutorials how your tool will work that would be of great help.
The text was updated successfully, but these errors were encountered: