Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Hi, @hash3liZer
Thanks for support this project. Can your answer me...
I want make chain: victim -> evil-> socsk5 -> target -> socks5 -> evil -> vicitm
is it real?
Hi, @hash3liZer Thanks for support this project. Can your answer me... I want make chain: victim -> evil-> socsk5 -> target -> socks5 -> evil -> vicitm is it real?