NEW COURSE LAUNCH SALE: Save 25% OFF!
Use Promo Code: EARLYBIRD25
Click SHOW MORE to View All Lessons
Getting Started: Welcome and Thank You for Joining the Course
Student Welcome Survey
Why This Phishlet Development Course Was Created and What It Aims to Achieve
Phishing in 2025: Current Threat Landscapes, MFA Fatigue and Defensive Measures
iPhone Man-in-the-Middle (MitM) Attack - iOS Attack Showcase on Hotel WiFi (Demo)
Phishing in 2025: Evilginx, EvilProxy, V3B: Showcasing Reverse Proxy Techniques for Advanced Phishing and Authentication Bypass
Evolution of Phishing Tools: Comparing Old-School Phishing vs Reverse-Proxy Methods, Tool Limitations, PyPhisher Technical Demo, and Microsoft Reverse-Proxy Implementation
Advanced Phishing Demonstration #1: EvilProxy
Advanced Phishing Demonstration #2: V3B Banking Phishing Kit
Advanced Phishing Kit Analysis: V3B Banking Phishing Kit
Reviewing Phishlets and Their Importance to Reverse-Proxy Phishing
Evilginx 3.0 Phishlet Documentation Deep Dive (with Use-Case Examples)
JavaScript Injection Techniques: Features, Syntax, Implementation Methods, Strategic Placement, and AI/LLM Integration Considerations
JavaScript Fundamentals: Variables, Control Flow, Functions, DOM Manipulation, Event Handling, String Operations, and Regular Expression Implementation
(Script) Instagram custom js_inject
POST Request Analysis and Technical Implementation of Forcing Post Requests
Fidelity Phishlet - Forcing Post Requests on a Banking Login | Fidelity Auth Study: Technical Analysis of Fidelity Implementation in Evilginx 3.3.0
Specific Force_Post Use Cases: Basic Auth to Multi-Parameter Handling
Advanced Force_Post Techniques: Complex Authentication Flows and Parameter Manipulation Methods
(Quiz & Review) Evilginx Phishlet Documentation
Fundamentals of YAML Syntax: A Comprehensive Guide To Programming in YAML (YAML Ain't Markup Language™)
YAML Basics: A Complete Language Guide with Examples
(Quiz & Review) YAML Fundamentals
Tools Required for this Course
Main Course Visual Studio Code Color Theme
Complete Tools and Environment Setup
Required Tools + Materials Direct Downloads
Compete Server Setup: Creating Fresh Server, Updating System & Evilginx Installation
(Code) Fixing Network Configuration & Resolving DNS issues
(Code) Quick One-Line VPS Setup for Evilginx3
(Optional) Updated GPT Prompt (If content blocking occurs)
Best Practices: Root vs. Non-Root Privileges
(Optional) How to Fix Nameserver on 53 & Address Already in Use Error
(Code) Phishlet Starter Templates
Why We Begin With Network Traffic Analysis
Sample - POST Request
GET Request - Example
GET vs POST Requests in Credential Phishing
Failure Points for Modern Phishing Attacks (Post Google/Yahoo Updates)
(Quiz and Review) Understanding Developer Tools for Network Analysis
Fundamentals of HTTP Cookies: Request Headers, Response Headers, Client Storage and Cookie Manipulation
How Authentication Works: Understanding Cookies, Session Management, and Token Implementation
Understanding HTTP Request/Response: Header Architecture and Cookie Management Through Browser Developer Tools
Understanding Cookies Quiz and Review
Simpler Hacking has received hundreds of messages about making phishlets for Evilginx based on our popular Evilginx3-Phishlets Repository on Github. Instead of answering each question and request individually, it would be more beneficial for the community to explain how to make phishlets from scratch with an updated and structured framework.
Scripting with .YAML & O365
This is common question.
For those concerned about the ethics of hacking tutorials as well as tools such as Evilginx or phishlet scripts, it's not the learning of the skill that's unethical, but the choices made in applying it.
It's like using a hammer – it can be used to build something or to break something. The tool isn't "bad" per say, it’s how you use it that matters. Ethical hacking is using that "hammer" to make things safer, not to cause damage.
Ethical hacking, for example, is a legitimate and necessary practice in improving cybersecurity.
The main thesis of this course was to create an unfiltered course on the art of creating phishlets for Evilginx that is taught in a way that can be understood and implemented by anyone.
This course teaches Evilginx phishlet programming at a forensic level taught with intent and proper nuance needed to be successful when creating these scripts and deploying them.
You’ll gain hands-on experience with practical examples, tackling challenges like bypassing MFA, advanced programming, and token interception on popular US based companies.
This course fills a gap in reliable resources. It empowers you with the skills to operate at a high level independently, eliminating reliance on unreliable or incomplete guides.
This course speaks directly to programmers who are ready to master Evilginx phishlet creation—from understanding basic concepts to implementing sophisticated customizations. You'll get clear, code-driven examples and nuanced insights.
Students Seeking Deep Technical Knowledge: Educational resources related to Evilginx phishlet creation are limited. This course was built for those who want to understand why things work—not just how to make them work.
Those Willing to Commit to the Full Learning Experience: Building phishlets from scratch is not easy without guidance—it requires patience, technical effort, and a commitment to learning. This course is structured to give you a comprehensive understanding of phishlet development, but it demands your time and focus.
For Those Who Want to Elevate Phishing Beyond the Basics: Everybody is stressed about phishing and AI in the hands of cybercriminals obviously isn't helping. At an advanced level, phishing becomes an art form, where the real challenge lies in manipulating the target's trust over a sustained period.
Hackers Focused on Defensive and Offensive Techniques: This course is ideal for hackers who want to understand not only how phishing attacks work but also how to defend against them. An important section of the course includes the methodology of phishing-resistant MFA as well as a full comprehensive tutorial of how to activate/deactivate such protections.
For anyone wanting to learn about MFA phishing and how to think like an attacker.
With practice, it becomes much easier over time.
That way you can make phishlets yourself without any outside intervention or troubleshooting. From proxy_hosts to js_inject.
Understanding each parameter with examples & references for contextual understanding
50% of Simpler Hacking students are outside of the USA, being able to bring a cost-effective solution to this information is important.
This is a training course made for Hackers & Red Teamers looking to improve their phishing skills and understand how to build custom phishlets that bypass 2025's security measures.