A tool to bypass 2 factor authentication.
python3 -m pip install onefactorauth
1fa config -p <phone_number>
(ex: 1fa config -p 31616099881
)https://receivesms.cc/sms/31616099881
) to see the text message$: 1fa code --help
usage: 1fa code [-h] [-c] [-t TIMEOUT] [-p PATTERN] [-m MAX_TIME]
Get 1fa code
options:
-h, --help show this help message and exit
-c, --clipboard copy to clipboard
-t TIMEOUT, --timeout TIMEOUT
timeout (s)
-p PATTERN, --pattern PATTERN
regex pattern for passcode
-m MAX_TIME, --max-time MAX_TIME
maximum age of the sms code msg (min)
SMS p***codes: 93209
SMS p\*\*\*codes: (\d+)
Your Uber code is 43890
Uber code is (\d+)
(partial matches are acceptable)1fa code --pattern='code is (\d+)' --clipboard
to a keybind
super+u
: 1fa code --timeout=3 --clipboard && notify-send -i system-lock-screen -t 1 'UCLA Duo' 'Copied!' || notify-send -i system-lock-screen -t 1 'UCLA Duo' 'Oopsie woopsie'
It uses https://receivesms.cc/sms/ to receive and scrape texts for your text passcode
UCLA makes me 2fa every time I wanna log into my portal. No one's trying to hack my BruinBill, UCLA, just lemme use my account. I have 2fa setup for GitHub and Discord which are likelier targets for hacking and neither of them ask me for 2fa on every login.
Do WTF You Want To Public License
Developed by Ronak Badhe (r2dev2)