[+] Mod 01:
Evilginx URL Rewriting
[+] Mod 02:
Dynamic Device Code Phishing
[+] Mod 03:
MFA Bypass: Azure AITM Phishing
[+] Mod 04:
GitLab Device Code Phishing
[+] Mod 05:
Client Analysis Via Cloudflare Workers
[+] Mod 06:
Evilginx Phishlet Development
[+] Mod 07:
MFA Bypass: Building An Invisible Proxy Via Cloudflare Workers
[+] Mod 08:
Protecting Evilginx Server Via Caddy
[+] Mod 09:
Microsoft Device Code Phishing
[+] Mod 10:
GitHub Device Code Phishing
[+] Mod 11:
Illicit Consent Grant
[+] Mod 12:
MFA Bypass: Building An Invisible Proxy
[+] Mod 13:
Invisible Proxy: Opsec Considerations
[+] Mod 14:
MOTW Bypass Via FileFix Variations
[+] Mod 15:
Introduction To ClickFix
[+] Mod 16:
ClickFix: Run Dialog Alternatives
[+] Mod 17:
Anti-Analysis Via Reverse DNS Query
[+] Mod 18:
Anti-Analysis Via Invisible Encoding
[+] Mod 19:
HTML Smuggling Strategies
[+] Mod 20:
Analyzing and Evading SmuggleShield
[+] Mod 21:
Integrating Anti-Bot With HTML Smuggling
[+] Mod 22:
SVG Smuggling
[+] Mod 23:
WebAssembly Smuggling
[+] Mod 24:
Automate Phishing Infrastructure: Ansible
[+] Mod 25:
Collecting & Analyzing JA4 Bot Telemetry
[+] Mod 26:
Anti-Bot Via Advanced JA4 Analysis
[+] Mod 27:
HTML Smuggling
[+] Mod 28:
Phishing Detection Methods
[+] Mod 29:
Automate Phishing Infrastructure: Terraform
[+] Mod 30:
Customizing Evilginx: Opsec Configuration
[+] Mod 31:
Ad Blocker Detection
[+] Mod 32:
Adversary-In-The-Middle (AITM) Via Evilginx
[+] Mod 33:
Manual Timed-Based One-Time Password (TOTP) Harvesting
[+] Mod 34:
Practical Phishing Detection Examples
[+] Mod 35:
Protecting Phishing Servers Via Caddy
[+] Mod 36:
Building An Anti-Bot Library
[+] Mod 37:
Evading Google Safe Browsing
[+] Mod 38:
Introduction To Caddy
[+] Mod 39:
Building a Client Logging Library
[+] Mod 40:
Collecting & Analyzing Bot Telemetry
[+] Mod 41:
JA4 Analysis: Blacklisting Partial JA4 Fingerprints
[+] Mod 42:
JA4 Analysis: Whitelisting Partial JA4 Fingerprints
[+] Mod 43:
JA4 Analysis: Blacklisting JA4 Fingerprints
[+] Mod 44:
JA4 Analysis: Calculating JA4 Fingerprints
[+] Mod 45:
JA4/JA4S Fingerprinting
[+] Mod 46:
JA3/JA3S Fingerprinting
[+] Mod 47:
JARM Fingerprinting
[+] Mod 48:
Serverless Phishing: Cloudflare Worker
[+] Mod 49:
Improving Domain Reputation: Web Traffic
[+] Mod 50:
Improving Domain Reputation: Domain Categorization
[+] Mod 51:
Improving Domain Reputation: Domain Aging
[+] Mod 52:
Hiding Domain Via Referrer-Policy
[+] Mod 53:
Incognito Mode Detection
[+] Mod 54:
Anti-Analysis: Approve Access Via Discord
[+] Mod 55:
Anti-Analysis: Approve Access Via Push Notifications
[+] Mod 56:
Anti-Analysis: Approve Access Via Email
[+] Mod 57:
Anti-Bot Via Improper Window Size
[+] Mod 58:
Anti-Bot Via CAPTCHA
[+] Mod 59:
Anti-Analysis Via Website Keying
[+] Mod 60:
Anti-Analysis Via Honeypots
[+] Mod 61:
Anti-Bot Via User Interaction
[+] Mod 62:
Anti-Analysis Via Fetching Remote Content
[+] Mod 63:
Anti-Analysis: Dynamic Obfuscation via Obfuscator.io
[+] Mod 64:
Anti-Analysis Via Dynamic Encryption
[+] Mod 65:
Anti-Analysis Via AES Encryption
[+] Mod 66:
Anti-Analysis Via XOR Obfuscation
[+] Mod 67:
Anti-Analysis Via Base64 Obfuscation
[+] Mod 68:
Anti-Analysis Via Dynamic HTML Generation
[+] Mod 69:
Anti-Analysis Via IP Restrictions
[+] Mod 70:
Anti-Bot Via User-Agent Spoofing Detection
[+] Mod 71:
Anti-Bot Via User Agent Filtering
[+] Mod 72:
Detecting Headless Browsers Via WebDriver Property
[+] Mod 73:
Anti-Analysis Via Cookie Check
[+] Mod 74:
Protecting Phishing Servers Via Nginx
[+] Mod 75:
Nginx Demo: Reverse Proxying NordVPN.com
[+] Mod 76:
Introduction To Nginx's Capabilities
[+] Mod 77:
Protecting Phishing Servers Via Mod_Rewrite
[+] Mod 78:
Introduction To Apache Mod_Rewrite
[+] Mod 79:
Securing Server Via Cloudflare
[+] Mod 80:
Secure SSH Configuration
[+] Mod 81:
Securing Server: Removing Verbose Information
[+] Mod 82:
Securing Server: Blocking Direct IP Access
[+] Mod 83:
Securing Server: Restrict HTTP Access
[+] Mod 84:
Analyzing Server Security
[+] Mod 85:
Performing Input Validation
[+] Mod 86:
Integrating Backend Functionality
[+] Mod 87:
Designing Custom Phishing Pages
[+] Mod 88:
Cloning Detection Mechanisms
[+] Mod 89:
Cloning Websites Via Browser Extension
[+] Mod 90:
Introduction To Flask
[+] Mod 91:
Web Server Setup: Nginx & Flask
[+] Mod 92:
Database Setup: MySQL
[+] Mod 93:
SSL Configuration: Comodo SSL
[+] Mod 94:
Wildcard Certificate Via Let's Encrypt
[+] Mod 95:
SSL Configuration: Let's Encrypt
[+] Mod 96:
Domain and DNS Configuration
[+] Mod 97:
Web Server Setup: Apache & PHP
[+] Mod 98:
Deploying Phishing Infrastructure
[+] Mod 99:
Introduction To Phishing
[+] Mod 100:
Phishing Requirements
[+] Mod 101:
Opsec Failure: Directory Listing
root@htb:~#
_