Phishing Kits & PhaaS

What Is EvilnoVNC?

EvilnoVNC is an open-source "ready-to-go" phishing platform that uses noVNC (HTML5 VNC client) to stream a real browser session to victims, enabling Browser-in-the-Browser (BitB) attacks that capture credentials, MFA codes, and session cookies in real-time.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

EvilnoVNC is an open-source "ready-to-go" phishing platform that uses noVNC (HTML5 VNC client) to stream a real browser session to victims, enabling Browser-in-the-Browser (BitB) attacks that capture credentials, MFA codes, and session cookies in real-time. Developed by Joel Gamez Molina with GNU 3.0 license and multiple community forks, EvilnoVNC represents next-generation phishing through browser session streaming. Unlike reverse proxy phishing tools such as Evilginx or Modlishka, EvilnoVNC streams an entire real browser desktop to the victim as an HTML5 canvas element, making the attack fundamentally harder for target websites to detect because the original website cannot technically distinguish between a real user and a streamed VNC session (turingpoint, 2024).

How Does EvilnoVNC Work?

Virtual browser setup involves attacker setting up browser instance inside VNC/X11 virtual desktop environment, typically Ubuntu or Linux server according to GitHub and HackingArticles. Real login page loading occurs within the virtual browser where attacker loads the legitimate login page for Gmail, Microsoft 365, banking portals, and other services.

noVNC web interface exposes virtual browser session via noVNC HTML5 VNC client, creating web-based remote desktop interface accessible through any modern browser without plugins or software installation. The underlying technology is noVNC, a JavaScript-based VNC client that renders the remote desktop as an HTML canvas element, effectively streaming the browser session like a video to the victim (Adepts of 0xCC, 2023). Phishing delivery sends victim phishing email, QR code, or SMS linking to noVNC session appearing to be the real website. Browser-in-the-Browser illusion shows victim what appears to be normal browser tab or window, but is actually viewing remote browser through HTML5 canvas. Because the entire page is rendered as a canvas element rather than standard HTML DOM elements, the underlying page structure is completely different from what the victim perceives, making traditional DOM-based phishing detection ineffective (Push Security, 2024).

Credential interception captures all input as victim types username, password, and MFA codes in real-time. Session cookie access stores victim's authenticated session cookies in virtual browser profile accessible to attacker via /novnc/download/ directory. Keystroke logging logs all keystrokes to files stored in download directory. Real-time session monitoring allows attacker to watch victim interactions live, seeing downloads, browsing history, and saved passwords in browser profile. Session hijacking enables downloaded cookies.txt file to be imported directly into attacker's browser for instant authenticated access.

How Does EvilnoVNC Differ From Other Tools?

Aspect

EvilnoVNC

Starkiller

Modlishka

Muraena

Technical Approach

Browser streaming via noVNC

Headless Chrome proxy

Reverse proxy

Reverse proxy + automation

Victim Sees

Real browser session

Real proxied site

Real proxied site

Real proxied site

Credential Capture

Real-time keystroke capture

Automatic relay

Traffic sniffing

Traffic sniffing

Session Management

Browser profile accessible

Session cookies captured

Session cookies captured

Session cookies captured

MFA Bypass

User types code in real browser

Real-time relay

Real-time relay

Real-time relay

Monitoring

Full real-time desktop view

Livestream only

Log-based

Medium

Attacker Visibility

Browser profile, downloads, history

Live victim action

Limited

Medium

Ease of Use

High (Docker-based)

High (SaaS)

Medium

Medium

Cost

Free (open-source)

Subscription

Free

Free

Ideal for

Red teams seeking session streaming

Managed phishing campaigns

Technical attackers

Automated phishing operations

Why Does EvilnoVNC Matter?

Open-source availability since approximately 2022 with earliest GitHub archive entry September 2022. Multiple active forks and variants indicate adoption including MultiEvilnoVNC by wanetty, EvilKnievelnoVNC by ms101, and redteamsecurity2023 variant. EvilKnievelnoVNC is particularly notable as a weaponized variant offering scalable and semi-automated MFA phishing through concurrent EvilnoVNC instances, with features including auto-blocking of users after successful authentication with a custom message and the ability to manipulate target sites via Chromium extensions to hide alternative login methods such as hardware tokens (GitHub, 2023). 1.1k+ GitHub stars and 195+ forks show community interest and adoption. Described as "next-generation phishing technique" and "growing threat" as of 2025 according to SecurityOnline and Push Security. Part of broader shift from simple HTML cloning to browser-based exploitation techniques. A key advantage over reverse proxy phishing is that the original website could theoretically detect a reverse proxy through server-side checks, but cannot detect streamed content delivered through EvilnoVNC since the browser interaction occurs on the attacker's server (turingpoint, 2024). Growing mention in threat intelligence reports and security advisories in 2024-2025. Used alongside other AiTM kits in sophisticated phishing campaigns. Featured in security conferences and red team demonstrations with DEF CON references. Deployed by both legitimate penetration testers and criminal actors.

What Are EvilnoVNC's Limitations?

Network latency means user experiences lag depending on network quality, with noticeable delay between keystrokes and cursor movement potentially alerting suspicious users. Browser inconsistencies occur because virtual browser may render differently than victim's native browser, revealing BitB attack if victim looks closely at rendering artifacts. Resource consumption requires full browser instance per victim session, with scaling to hundreds of concurrent sessions requiring significant server resources. Infrastructure visibility exposes web interface running noVNC server that may be detected by network monitoring if not properly secured. File system access requires attacker to maintain access to /novnc/download/ directory, and if server is compromised, these files could be discovered by incident responders. Certificate handling includes SSL/TLS certificate mismatch between self-signed and legitimate that could raise suspicion on sophisticated victim systems. Performance impact means real-time streaming of entire desktop consumes significant bandwidth, with slow networks making the experience unusable. No automation unlike Muraena/NecroBrowser means attacker must manually use stolen cookies. Keyboard layout issues occur because virtual browser may have different keyboard layout than victim, making typing appear inconsistent. Clipboard isolation means victim's clipboard is not accessible to virtual browser, limiting seamless copy-paste operations.

How Can You Defend Against EvilnoVNC?

Browser-in-the-Browser detection educates users on BitB attacks, training them to look for rendering inconsistencies, lag, or unusual browser behavior. Browser-based security agents represent a growing defense category, with platforms like Push Security offering preconfigured detections for phishing tools like EvilnoVNC that check for the fingerprints of these toolkits as end users visit websites (Push Security, 2024). Bringing detection and response capabilities directly into the browser provides security teams with visibility into identity attacks that endpoint-based tools cannot offer. Session anomaly detection monitors for sessions accessing unusual resources, multiple simultaneous logins from different IPs, or sessions from VPN or proxy endpoints. Network-level controls deploy proxies and firewalls that block noVNC port 6080 and VNC port 5900 from external access. Hardware security keys implement FIDO2/U2F hardware keys that cannot be captured through any phishing or MITM technique. Behavioral analytics monitor for impossible user behavior including simultaneous logins, access from multiple countries, and rapid-fire API calls. Email security deploys advanced phishing detection to identify suspicious sender addresses and noVNC-hosting infrastructure URLs. Re-authentication requires step-up authentication for sensitive operations including password changes, security settings, and data access. Device fingerprinting detects sessions with unusual device fingerprints or TLS patterns inconsistent with user's normal devices. Geolocation verification blocks or requires additional verification for logins from unexpected geographic locations. Credential Guard on Windows isolates credentials from browser and other applications to prevent credential theft. User behavior monitoring flags unusual patterns like session access followed immediately by automated actions including password changes and forwarding rules.

FAQs

How is EvilnoVNC different from traditional phishing sites?

Traditional phishing creates fake HTML pages that look like login screens but are actually just forms on attacker's server according to HackingArticles and Mr. d0x. EvilnoVNC is fundamentally different: it's streaming an actual real browser session to the victim. The victim isn't filling out a fake form—they're legitimately typing into a real browser window. This means the login actually works, the page never has the slight imperfections of cloned HTML, and MFA codes are captured exactly as the legitimate service sends them.

How can a victim tell the difference between EvilnoVNC and a real website?

It's extremely difficult according to security analysis. The victim sees a real browser with a real login page. The main tells are subtle: there may be slight lag between keystrokes and cursor movement, rendering artifacts from the VNC compression, or unusual scrolling behavior. Most victims would not notice these unless they were specifically looking for them. The attack relies on the social engineering phishing email to motivate the victim to log in quickly without examining the interface carefully.

Can attackers use the stolen cookies to log in without the victim noticing?

Yes according to GitHub documentation. EvilnoVNC downloads the victim's entire browser profile, including cookies, saved passwords, and browsing history. By importing the cookies.txt file into their own browser, the attacker gains instant authenticated access. The victim might not notice immediately unless they have notifications enabled for new logins, or unless they check their account activity logs.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.