Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Phishing / Social Engineering Books
  • Social Engineering: The Art of Human Hacking
  • Other Tools
  • Anonphisher
  • LordPhish
  • Evilginx
  • King Phisher
  • Shellphish
  • Nex Phisher
  • Blue Eye
  • Adv Phishing
  1. Phishing Attacks

Additional Information

PreviousHow to secure yourself from phishing attacksNextHardware Attacks

Last updated 1 year ago

Phishing / Social Engineering Books

Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Other Tools

Anonphisher

Automated phishing tool made by AnonyminHack5 to phish various sites with 51+ templates and also has an inbuilt reverse proxy already to easily help you generate your link and send it to your victim. Anonphisher tool is made with pure bash script and needs required packages for it to work.

LordPhish

Evilginx

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows bypassing 2-factor authentication protection.

This tool is a successor to Evilginx, released in 2017, which used a custom version of the Nginx HTTP server to provide man-in-the-middle functionality to act as a proxy between a browser and phished website. The present version is fully written in GO as a standalone application, which implements its own HTTP and DNS server, making it extremely easy to set up and use.

King Phisher

King Phisher is a tool for testing and promoting user awareness by simulating real-world phishing attacks. It features an easy to use, yet very flexible architecture allowing full control over both emails and server content. King Phisher can be used to run campaigns ranging from simple awareness training to more complicated scenarios in which user aware content is served for harvesting credentials.

Shellphish

Nex Phisher

Blue Eye

Adv Phishing

Social EngineeringAmazon.com
Logo
GitHub - TermuxHackz/anonphisher: Automated phishing tool made by AnonyminHack5 to phish various sites with 30+ templates and also has an inbuilt ngrok already to easily help you generate your link and send it to your victim. Anonphisher tool is made with pure bash script and needs required packages for it to work.GitHub
GitHub - Black-Hell-Team/LordPhish: The most complete phishing toolGitHub
GitHub - kgretzky/evilginx: PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2GitHub
GitHub - rsmusllp/king-phisher: Phishing Campaign ToolkitGitHub
★ Shellphish ★
Logo
Logo
GitHub - AbirHasan2005/ShellPhish: Modded version of shellphish. Mod Features are Colourized Text, Animations, In built setup for Termux, Extra features, More improvements, Bugs cleared, Fixed URL not showing.GitHub
Shellphish Tool in Kali Linux - GeeksforGeeksGeeksforGeeks
HackingPassion.com : root@HackingPassion.com-[~]HackingPassion.com
GitHub - htr-tech/nexphisher: Advanced Phishing toolGitHub
Logo
Logo
GitHub - BullsEye0/blue_eye: Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses and much more ..! Author: Jolanda de KoffGitHub
GitHub - Ignitetch/AdvPhishing: This is Advance Phishing Tool ! OTP PHISHINGGitHub
Logo
AdvPhishing : OTP Bypass Phishing Tool - SecnhackSecnhack
Logo
Logo
Logo
Logo
Logo