performing-adversary-in-the-middle-phishing-detection
mukul975/Anthropic-Cybersecurity-Skills
Guides defenders through detecting and responding to Adversary-in-the-Middle phishing attacks that leverage reverse proxy kits such as EvilProxy, Evilginx, and Tycoon, covering prerequisites (MFA, SIEM ingestion, conditional access), detection rules, proxy monitoring, and post-compromise validation.