What is EvilProxy? Advanced phishing tool that enables attackers to bypass two-factor authentication (2FA) and Multi-Factor Authentication (MFA). It acts as a reverse proxy, intercepting and manipulating traffic between a user and a legitimate service to capture credentials and session tokens.
Tools Research: Navigate to the Tutorials folder for introductory guides on EvilProxy. Explore the Research Papers section for in-depth technical insights. Check out the Tools and Scripts section for practical resources. We encourage contributions and collaborations.
Fork the Repository: Create your own fork of the project. Create a Feature Branch: Make your changes in a new branch. Submit a Pull Request: Submit your contributions for review.
![Screenshot 2023-12-18 004324](https://private-user-images.githubusercontent.com/144496661/291227203-72be395d-51d7-4cc0-9b06-becc91c3bae9.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3MjE1NTY3NjEsIm5iZiI6MTcyMTU1NjQ2MSwicGF0aCI6Ii8xNDQ0OTY2NjEvMjkxMjI3MjAzLTcyYmUzOTVkLTUxZDctNGNjMC05YjA2LWJlY2M5MWMzYmFlOS5wbmc_WC1BbXotQWxnb3JpdGhtPUFXUzQtSE1BQy1TSEEyNTYmWC1BbXotQ3JlZGVudGlhbD1BS0lBVkNPRFlMU0E1M1BRSzRaQSUyRjIwMjQwNzIxJTJGdXMtZWFzdC0xJTJGczMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDI0MDcyMVQxMDA3NDFaJlgtQW16LUV4cGlyZXM9MzAwJlgtQW16LVNpZ25hdHVyZT0wY2QxMWFmOThmMjZlMDMyNTljMWZiYTE0OTdkZjQyOWFiNTkwYTQyYTZkMTFmNjRjZDY0MTFkNDViNWVhNzg3JlgtQW16LVNpZ25lZEhlYWRlcnM9aG9zdCZhY3Rvcl9pZD0wJmtleV9pZD0wJnJlcG9faWQ9MCJ9.kSd7dpM30Q19lrSZEKNqpntH9CtYPuf7eTwQeoFuMn8)