How FactorCat Works
The entire MFA flow in about 3 seconds. No switching apps. No copying digits.
You visit a login page
The browser extension detects the MFA input field automatically. It knows which site you're on and which account you're signing into.
Your phone gets a push
A notification appears with the site name and your account. You know exactly what's being requested before you approve.
You tap approve
One tap to confirm. Your phone generates the 6-digit TOTP code locally — the secret never leaves your device.
The code fills in
The computed code appears in the browser field. You're in. Total time: about 3 seconds after the push arrives.
Three ways to get started
All paths lead to the same place — your phone and browser working together. Choose what fits you.
App first
Download the app. Add your first factor. Install the extension when you're ready for auto-fill. Best for newcomers to MFA.
Extension first
Install the browser extension. Sign in. Pair your phone with one QR scan. Best for desktop-first power users.
Web first
Sign up on the web dashboard. Review the security model. Download the app and pair. Best for evaluators.
Works standalone, too
You don't need an account or a browser extension to use FactorCat. Download the app, add your tokens, and use it as a regular authenticator — no sign-up required. Your factors are stored locally on your device, protected on-device. When you're ready for auto-fill, create an account and pair with the extension. There's no deadline.
Adding factors
Scan a QR code — the standard way. When a service shows you a setup QR code, open FactorCat and scan it. Done.
Manual entry — if you can't scan, enter the secret key directly. FactorCat labels and organizes it for you.
Extension detection — when you're setting up MFA on a new service, the browser extension detects the setup page and prompts you to add the factor. One click from browser to phone.
What if you lose your phone?
Recovery depends on which vault type you chose — and FactorCat is upfront about this at setup, not after the fact.
Cloud Vault
Sign in to the web dashboard. Your tokens are there. View codes, copy them, and set up a new phone. Instant recovery.
Locked Vault
Your phone's OS backup likely has your master key — restoring to a new device usually just works. For a backup you fully control, save your recovery phrase or QR code. Without either, those tokens are gone — that's the cost of zero-trust encryption.
Try it yourself
Get FactorCat and see the approve-and-autofill flow in action.