Skip to content

@2FABypass Signature send all request to 2FABypass Api as the offensive counterpart to @2SSDP (Self-Sign-Deploy-Protection), DheReckahsTeam's defensive project. While 2FABypass identifies flaws through attack simulation, @2SSDP uses the resulting signatures to automate defense mechanisms

License

Notifications You must be signed in to change notification settings

2FABypass/Signature

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 

Repository files navigation

Dhe Reckah 2FABypass Signature Project

Dhe Reckah 2FABypass Signature is a highly advanced, customizable front-end phishing simulation framework designed for web security research. It enables rapid cloning of any target website's authentication page, capturing credentials, tokens, and session data with perfect fidelity while seamlessly integrating with the backend API.

This project is part of DheReckahsTeam’s Web Security Investigation Project, focused on demonstrating real-world authentication risks through controlled simulations and promoting stronger security practices.

Strictly for educational and authorized security research purposes only.


Table of Contents


Project Overview

Dhe Reckah 2FABypass Signature is the front-end component of the 2FA Bypass ecosystem — a powerful signature page generator that allows researchers to create pixel-perfect clones of any login or authentication interface.

The tool captures all user input (credentials, 2FA codes, cookies, tokens) and forwards it securely to the backend API for real-time processing and storage.

Built for maximum realism and flexibility, it supports advanced phishing simulations in controlled environments.


Key Features & Enhancements

  • Pixel-Perfect Website Cloning: Clone any authentication page (Gmail, Facebook, banking, corporate portals) with exact visual and functional accuracy.
  • Dynamic Form Handling: Automatically captures POST/GET data from cloned forms.
  • Seamless Backend Connectivity: All captured data is sent to DheReckahApi for centralized logging and analysis.
  • Multi-Language Payload Support: Compatible with API-generated payloads in Python, JavaScript, Go, and Rust.
  • Dual Live Control Panels:
    • Telegram Bot Control — Instant notifications, victim tracking, remote commands
    • Web Admin Panel — Comprehensive dashboard with data export, session management, and analytics
  • Zero-Modification Deployment: Single upload to any PHP host — works immediately.
  • Advanced Stealth Features: Anti-detection techniques, session persistence simulation, and dynamic response handling.

Website Cloning & Customization

The core power of 2FABypass Signature lies in its ability to clone any website and make it fully operational with the backend API.

Advanced Cloning Process

  1. Target Analysis:

    • Inspect the target login/authentication page
    • Extract full HTML structure, CSS, and JavaScript
  2. Signature Page Creation:

    • Use the base index.php template from this repository
    • Integrate cloned HTML/CSS/JS for perfect visual match
  3. ID & Class Name Modification:

    • Precisely replicate original input field IDs and classes (e.g., Gmail's identifierId, Facebook's email/pass)
    • Ensure form action is empty or self-posting
    • This allows perfect mimicry while routing all data to the API
  4. API Integration:

    • All form submissions are automatically captured
    • Data forwarded to DheReckahApi endpoints for:
      • Real-time credential storage
      • Token extraction
      • 2FA code interception
      • Session reconstruction
  5. Testing & Validation:

    • Submit test credentials
    • Verify capture in control panels

Example cloned form structure: https://t.me/TwoFactorAuthenticationBypass


Control Panels

Switch seamlessly between two powerful live control interfaces:

  • Telegram Bot Control:

    • Real-time victim notifications
    • Instant credential viewing
    • Remote campaign management
  • Web Admin Panel:

    • Full dashboard with detailed logs
    • Data export (CSV/JSON)
    • Session replay and analysis
    • Multi-signature management

Both panels are fully synchronized and powered by DheReckahApi.


DheReckahApi Integration

All signature pages connect directly to DheReckahApi — the central backend engine handling data processing, storage, and notifications.

We are currently on the 2FABypass/Signature.
For detailed documentation on 2FABypass/Api, visit: https://github.com/2FABypass/Api

This architecture makes Dhe Reckah 2FABypass one of the most versatile and maintainable 2FA research tools available in 2026.

The API provides:

  • Secure credential logging
  • Real-time session tracking
  • Token and cookie extraction
  • Multi-signature support
  • Telegram and web panel synchronization

No additional backend setup required — just deploy the signature page.


Deployment

  1. Upload index.php + assets to any PHP hosting provider
  2. Configure domain/subdomain
  3. Connect to DheReckahApi (pre-configured in template)
  4. Start monitoring via Telegram bot or Web Admin Panel

Deployment complete in minutes — no modifications needed.


References

  1. Live Demonstration by DheReckahsTeam: 2FA Bypass Strategies

Legal and Ethical Disclaimer

This project is intended exclusively for educational purposes and authorized security testing.

Any unauthorized use against systems without explicit written permission is illegal and strictly prohibited.

Researchers must comply with all applicable laws, including but not limited to the Computer Fraud and Abuse Act (CFAA), Computer Misuse Act, and GDPR.

The authors and contributors accept no liability for misuse of this information.

Use responsibly. Test only systems you own or have permission to test.

DheReckahsTeam — Advancing Web Security Research • 2026

About

@2FABypass Signature send all request to 2FABypass Api as the offensive counterpart to @2SSDP (Self-Sign-Deploy-Protection), DheReckahsTeam's defensive project. While 2FABypass identifies flaws through attack simulation, @2SSDP uses the resulting signatures to automate defense mechanisms

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published