You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 19, 2022. It is now read-only.
You will need a managment domain. This domian can be the same domian used for phishing emails. After you buy a domain set the name server records to Digital Ocean.
3. Customize the variables inside the vars folder.
89
+
### 3. Customize the variables inside the vars folder.
84
90
85
91
86
-
4. Create API keys for both Digital Ocean & Azure.
92
+
### 4. Create API keys for both Digital Ocean & Azure.
87
93
88
-
- Digital Ocean API Key https://www.digitalocean.com/docs/apis-clis/api/create-personal-access-token/#:~:text=To%20generate%20a%20personal%20access,the%20Generate%20New%20Token%20button.
94
+
- Digital Ocean API Key https://www.digitalocean.com/docs/apis-clis/api/create-personal-access-token/#:~:text=To%20generate%20a%20personal%20access,the%20Generate%20New%20Token%20button.
@@ -127,6 +133,12 @@ To get the password on first login check the docker logs
127
133
128
134
`docker logs gophish`
129
135
136
+
### Mitmproxy
137
+
138
+
You can access Mitmproxy via the hostname set for "mitmproxy_hostname"
139
+
140
+
The mitmproxy web interface allows you to see the RAW traffic between evilginx2 and your target server. You can use this to check for problems and remove any IOC's. Mitmproxy is a dignostic tool to inspect https traffic.
141
+
130
142
## Development
131
143
132
144
Does none of this work for you? Submit a issue and I will see what the problem is.
0 commit comments