Electric Eye 作者: gbiondo@reveng3.org
Client-side AitM attack detection engine — Vengeance Suite
4 个用户4 个用户
扩展元数据
关于此扩展
Electric Eye detects Adversary-in-the-Middle attacks in real time,
before your credentials are stolen.
Traditional MFA is defeated by real-time proxy kits like Evilginx and
Starkiller. The attack is invisible — the browser shows a valid
certificate, the site looks legitimate, the login succeeds. Your session
token is already gone.
Electric Eye analyses TLS fingerprints, HTTP headers, and DOM content
to detect proxy anomalies. Detection runs locally in WebAssembly — no
data leaves your browser.
Signals detected:
- Domain mismatch between URL and page content
- Certificate age anomalies
- Stripped security headers (CSP, HSTS)
- Proxy header signatures
- Protocol downgrade
before your credentials are stolen.
Traditional MFA is defeated by real-time proxy kits like Evilginx and
Starkiller. The attack is invisible — the browser shows a valid
certificate, the site looks legitimate, the login succeeds. Your session
token is already gone.
Electric Eye analyses TLS fingerprints, HTTP headers, and DOM content
to detect proxy anomalies. Detection runs locally in WebAssembly — no
data leaves your browser.
Signals detected:
- Domain mismatch between URL and page content
- Certificate age anomalies
- Stripped security headers (CSP, HSTS)
- Proxy header signatures
- Protocol downgrade
评分 0(1 位用户)
权限与数据
更多信息