# Welcome RProxy LAB by \[cfs0x]

Welcome to the <mark style="color:red;">RProxy LAB</mark> ! Here you will get an overview of all the amazing features that the by <mark style="color:red;">INJECT</mark> team offers to help you create quality <mark style="color:red;">PHISHING Tools</mark> \[ Mods <mark style="color:$success;">EvilGinx</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">Modlishka</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">EvilPUPPET</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">NODE JS</mark>  <mark style="color:red;">-</mark> <mark style="color:$success;">Project</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">PHISHLETs</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">Email Templates for GOPhish</mark> <mark style="color:red;">X</mark> <mark style="color:$success;">Scripts for Injects</mark><mark style="color:$info;">,</mark> <mark style="color:$success;">e.t.c</mark> ]

You will see some of the best parts of the <mark style="color:$success;">EvilGinx</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">Modlishka</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">EvilPUPPET</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">NODE JS Project</mark> in action and find help on how you can turn this template into your own.

<mark style="color:orange;">Modifications of</mark> <mark style="color:red;">RProxy</mark><mark style="color:orange;">.</mark> Initially <mark style="color:red;">RProxy</mark> was created as a laboratory for testing security systems, proxying traffic, and obtaining credentials through phishing. Our laboratory develops and integrates the following functions<mark style="color:orange;">:</mark>

* <mark style="color:red;">Advanced authentication mechanisms:</mark> We implement support for various authentication methods, such as two-factor authentication (<mark style="color:red;">2FA</mark>), to provide deeper attack simulation and vulnerability analysis.
* <mark style="color:red;">Detection systems:</mark> We develop algorithms to hide <mark style="color:$success;">PHISHING Project</mark> activity from security systems such as IDS/IPS using steganography and encryption methods.
* <mark style="color:red;">API Integration:</mark> We automate the process of creating <mark style="color:$success;">PHISHLETs</mark> and managed sessions using the API to simplify and speed up the setup and testing process.

<mark style="color:orange;">Creating PHISHLETs x MODs are one of the main tools of</mark> <mark style="color:red;">RProxy</mark> <mark style="color:orange;">Labs. We focus on creating:</mark>

Facebook / Instagram / Bank templates for various services: The development of <mark style="color:$success;">PHISHLETs</mark> for popular web services (<mark style="color:$warning;">for example Google, Facebook, Instagram, Blockchain, Coinbase, Binance, Amazon AWS, e.t.c</mark> ) which can be easily customized and modified.

<mark style="color:red;">User interface settings:</mark> We provide the ability to change the design and interface of <mark style="color:$success;">PHISHLETs</mark> to more accurately reproduce authentic pages, which increases the likelihood of phishing success.

<mark style="color:red;">Logging and analysis:</mark> We are implementing systems to automatically collect data on user contributions: when was the login attempt made, from which IP addresses and at what time

<mark style="color:red;">Bypass automation:</mark> We develop scripts and algorithms for automatic interpretation and traversal of various types of captcha, such as reCAPTCHA, hCaptcha and others. This may include using artificial intelligence models developed for this purpose, which are trained to recognize and solve captchas.

<mark style="color:red;">Session support:</mark> We are developing functions to keep active sessions, allowing attackers to remain anonymous after capturing tokens. This contributes to a deeper simulation of real attacks.

{% hint style="info" %}
**Education and training We strive not only to develop tools, but also to educate users:**
{% endhint %}

<mark style="color:green;">Video tutorials and webinars:</mark> We regularly conduct training sessions on creating PhishProject x PHISHLETs and modifying tools, where we share knowledge and techniques used in real practice.

<mark style="color:green;">Documentation and manuals:</mark> We create detailed documentation, including step-by-step instructions on installing, configuring and using <mark style="color:$success;">EvilGinx</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">Modlishka</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">EvilPUPPET</mark> <mark style="color:red;">x</mark> <mark style="color:$success;">NODE JS Projects</mark> and its PHISHLETs to facilitate learning.

<mark style="color:green;">Community and Support:</mark> We are building a community of like-minded people where participants can share experiences, ask questions and solve problems together.

### Jump right in

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><h2><mark style="color:green;">#</mark> To <a href="/pages/kzTlst3tKo255yz4YpDi">begin</a></h2></td><td><mark style="color:red;"><strong>Start</strong></mark></td><td></td><td></td><td><a href="/pages/CyH2xJQs9yWJ1S8BYNav">/pages/CyH2xJQs9yWJ1S8BYNav</a></td></tr><tr><td><h2><mark style="color:green;">#</mark> <a href="/pages/CyH2xJQs9yWJ1S8BYNav"><strong>Install</strong> </a></h2><p><strong>Environment</strong></p></td><td><mark style="color:red;"><strong>Installation</strong></mark><strong> Steps​</strong></td><td></td><td></td><td><a href="/pages/7aUFmnCMx9m4smGncsXL">/pages/7aUFmnCMx9m4smGncsXL</a></td></tr><tr><td><h2><mark style="color:green;">#</mark> <a href="/pages/cEHgDv7NGBquDGHeLyQ4">PHISLETs</a></h2></td><td><strong>Create </strong><mark style="color:red;"><strong>PHISHLETs</strong></mark></td><td></td><td></td><td><a href="/pages/JjjojIyKxaiBPzzLwvtg">/pages/JjjojIyKxaiBPzzLwvtg</a></td></tr><tr><td><h2><mark style="color:green;">#</mark> <a href="/pages/JjjojIyKxaiBPzzLwvtg"><strong>Mod</strong></a></h2></td><td><mark style="color:red;"><strong>Mod</strong></mark><strong>s EvilGinx </strong><mark style="color:red;"><strong>X</strong></mark><strong> Evi1Grey5</strong></td><td></td><td></td><td></td></tr><tr><td><h2><mark style="color:green;">#</mark> <a href="/pages/Gnui9kAisvd9AItLS1Re"><strong>EvilPuppet</strong></a></h2></td><td><strong>Install </strong><mark style="color:red;"><strong>X</strong></mark><strong> Setting</strong></td><td></td><td></td><td></td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://rproxylab.gitbook.io/evilginx-lab-by-cfs0x/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
