BETA TESTING
A non-forked fork of EvilGophish.
A modular toolkit to inject randomized, obfuscated js_inject payloads into Evilginx3 phishlet YAMLs. Supports campaign-level polymorphism for advanced phishing simulations.
- Generates obfuscated JavaScript that steals session cookies
- Outputs YAML-compliant
js_injectblocks for Evilginx3 - Automatically inserts or replaces them in any
.yamlphishlet - Maintains YAML indentation and structure
- Fully scriptable, fast, and stealthy
| File | Purpose |
|---|---|
js_obfuscator_yaml.py |
Generates YAML-ready js_inject block |
inject_obfuscated_js.sh |
Modifies Evilginx3 phishlet YAML in-place |
LICENSE |
MIT License |
README.md |
You're reading it |
chmod +x inject_obfuscated_js.sh
./inject_obfuscated_js.sh /path/to/your/phishlet.yamlpython3 js_obfuscator_yaml.py > block.yamlcp /path/to/your/phishlet.yaml.bak /path/to/your/phishlet.yaml- Python 3.x
- Bash-compatible shell
This tool is provided for educational and authorized security testing use only. Do not use it for malicious purposes.
© 2025 KaliGPT | MIT License
To receive session tokens sent by the obfuscated JavaScript:
python3 evilfeed.pyThe script listens on /session_notify and logs any received tokens.
[2025-06-16 20:20:00] Captured session tokens: SID=abc; HSID=xyz; ...