Course Curriculum (All Lessons & Chapters)

Click SHOW MORE to View All Lessons

    1. Getting Started: Welcome and Thank You for Joining the Course

    2. Student Welcome Survey

    3. Why This Phishlet Development Course Was Created and What It Aims to Achieve

    4. Phishing in 2025: Current Threat Landscapes, MFA Fatigue and Defensive Measures

    5. iPhone Man-in-the-Middle (MitM) Attack - iOS Attack Showcase on Hotel WiFi (Demo)

    6. Phishing in 2025: Evilginx, EvilProxy, V3B: Showcasing Reverse Proxy Techniques for Advanced Phishing and Authentication Bypass

    7. Evolution of Phishing Tools: Comparing Old-School Phishing vs Reverse-Proxy Methods, Tool Limitations, PyPhisher Technical Demo, and Microsoft Reverse-Proxy Implementation

    8. Advanced Phishing Demonstration #1: EvilProxy

    9. Advanced Phishing Demonstration #2: V3B Banking Phishing Kit

    10. Advanced Phishing Kit Analysis: V3B Banking Phishing Kit

    1. Reviewing Phishlets and Their Importance to Reverse-Proxy Phishing

    2. Evilginx 3.0 Phishlet Documentation Deep Dive (with Use-Case Examples)

    3. JavaScript Injection Techniques: Features, Syntax, Implementation Methods, Strategic Placement, and AI/LLM Integration Considerations

    4. JavaScript Fundamentals: Variables, Control Flow, Functions, DOM Manipulation, Event Handling, String Operations, and Regular Expression Implementation

    5. (Script) Instagram custom js_inject

    6. POST Request Analysis and Technical Implementation of Forcing Post Requests

    7. Fidelity Phishlet - Forcing Post Requests on a Banking Login | Fidelity Auth Study: Technical Analysis of Fidelity Implementation in Evilginx 3.3.0

    8. Specific Force_Post Use Cases: Basic Auth to Multi-Parameter Handling

    9. Advanced Force_Post Techniques: Complex Authentication Flows and Parameter Manipulation Methods

    10. (Quiz & Review) Evilginx Phishlet Documentation

    1. Fundamentals of YAML Syntax: A Comprehensive Guide To Programming in YAML (YAML Ain't Markup Language™)

    2. YAML Basics: A Complete Language Guide with Examples

    3. (Quiz & Review) YAML Fundamentals

    1. Tools Required for this Course

    2. Main Course Visual Studio Code Color Theme

    3. Complete Tools and Environment Setup

    4. Required Tools + Materials Direct Downloads

    5. Compete Server Setup: Creating Fresh Server, Updating System & Evilginx Installation

    6. (Code) Fixing Network Configuration & Resolving DNS issues

    7. (Code) Quick One-Line VPS Setup for Evilginx3

    8. (Optional) Updated GPT Prompt (If content blocking occurs)

    9. Best Practices: Root vs. Non-Root Privileges

    10. (Optional) How to Fix Nameserver on 53 & Address Already in Use Error

    11. (Code) Phishlet Starter Templates

    1. Why We Begin With Network Traffic Analysis

    2. Sample - POST Request

    3. GET Request - Example

    4. GET vs POST Requests in Credential Phishing

    5. Failure Points for Modern Phishing Attacks (Post Google/Yahoo Updates)

    6. (Quiz and Review) Understanding Developer Tools for Network Analysis

    1. Fundamentals of HTTP Cookies: Request Headers, Response Headers, Client Storage and Cookie Manipulation

    2. How Authentication Works: Understanding Cookies, Session Management, and Token Implementation

    3. Understanding HTTP Request/Response: Header Architecture and Cookie Management Through Browser Developer Tools

    4. Understanding Cookies Quiz and Review

Evilginx Phishlet Developer Masterclass (2025)

  • $199.99
  • 10 hours of video content
  • Security Course
  • 18 Chapters

Course Previews

Why This Course Was Created

Simpler Hacking has received hundreds of messages about making phishlets for Evilginx based on our popular Evilginx3-Phishlets Repository on Github. Instead of answering each question and request individually, it would be more beneficial for the community to explain how to make phishlets from scratch with an updated and structured framework.

Scripting with .YAML & O365

Why would you teach people something like this? Can't Evilginx be used for bad?

This is common question.

For those concerned about the ethics of hacking tutorials as well as tools such as Evilginx or phishlet scripts, it's not the learning of the skill that's unethical, but the choices made in applying it. 

It's like using a hammer – it can be used to build something or to break something. The tool isn't "bad" per say, it’s how you use it that matters. Ethical hacking is using that "hammer" to make things safer, not to cause damage.

Ethical hacking, for example, is a legitimate and necessary practice in improving cybersecurity.


What This Course Focuses On

The main thesis of this course was to create an unfiltered course on the art of creating phishlets for Evilginx that is taught in a way that can be understood and implemented by anyone.

  • This course teaches Evilginx phishlet programming at a forensic level taught with intent and proper nuance needed to be successful when creating these scripts and deploying them.

  • You’ll gain hands-on experience with practical examples, tackling challenges like bypassing MFA, advanced programming, and token interception on popular US based companies.

  • This course fills a gap in reliable resources. It empowers you with the skills to operate at a high level independently, eliminating reliance on unreliable or incomplete guides.

  • This course speaks directly to programmers who are ready to master Evilginx phishlet creation—from understanding basic concepts to implementing sophisticated customizations. You'll get clear, code-driven examples and nuanced insights.

Who Exactly Is This Course For?

  • Students Seeking Deep Technical Knowledge: Educational resources related to Evilginx phishlet creation are limited. This course was built for those who want to understand why things work—not just how to make them work.

  • Those Willing to Commit to the Full Learning Experience: Building phishlets from scratch is not easy without guidance—it requires patience, technical effort, and a commitment to learning. This course is structured to give you a comprehensive understanding of phishlet development, but it demands your time and focus.

  • For Those Who Want to Elevate Phishing Beyond the Basics: Everybody is stressed about phishing and AI in the hands of cybercriminals obviously isn't helping. At an advanced level, phishing becomes an art form, where the real challenge lies in manipulating the target's trust over a sustained period.

  • Hackers Focused on Defensive and Offensive Techniques: This course is ideal for hackers who want to understand not only how phishing attacks work but also how to defend against them. An important section of the course includes the methodology of phishing-resistant MFA as well as a full comprehensive tutorial of how to activate/deactivate such protections.

  • For anyone wanting to learn about MFA phishing and how to think like an attacker.

Creating phishlets is a mixture of programming, logic & web security

With practice, it becomes much easier over time.

This training course will explain my systematic process for coding Evilginx Phishlets from scratch

That way you can make phishlets yourself without any outside intervention or troubleshooting. From proxy_hosts to js_inject.



Understanding each parameter with examples & references for contextual understanding

50% of Simpler Hacking students are outside of the USA, being able to bring a cost-effective solution to this information is important.


Master Creating Phishlets & Advanced Reverse-Proxy Phishing Attacks in 2025

This is a training course made for Hackers & Red Teamers looking to improve their phishing skills and understand how to build custom phishlets that bypass 2025's security measures.

Trusted by our sponsors

HuggingFace
Udemy Teacher on Simpler Hacking
DigitalOcean VPS Education Sponsor for SimplerHacking.com
HackerOne
Amazon Web Services Software Provider

DigitalOcean Referral Badge