Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Old Tools That's no longer functional
  • Black eye
  • Hidden Eye
  • New Tools that function currently
  • Zphisher
  • PyPhisher
  • SocialFish
  1. Phishing Attacks

GitHub Projects/Tools

PreviousTemporary NumbersNextKali Pre-Installed Tools

Last updated 1 year ago

Old Tools That's no longer functional

Black eye

Overview

BlackEye is a phishing tool that is used for educational and testing purposes. It allows security professionals, researchers, and ethical hackers to simulate phishing attacks and assess the security awareness of individuals and organizations. BlackEye provides a variety of pre-designed phishing pages and methods to trick users into revealing sensitive information, such as usernames, passwords, or other credentials.

BlackEye features

  • Wide range of templates: BlackEye offers a collection of phishing templates for popular websites like Facebook, Instagram, Google, Microsoft, and many more. These templates mimic the original login pages, increasing the chances of successful phishing attacks.

  • Customization options: Users can customize the phishing templates according to their needs. They can modify the appearance, content, and fields to make the phishing pages look authentic and enticing to victims.

  • Credential capture: BlackEye captures the submitted credentials entered by the victims on the phishing pages. It stores the captured data, allowing the attacker to access and use it later for unauthorized activities.

  • Phishing URL generation: BlackEye generates unique phishing URLs that can be shared with the target victims through various channels like email, social media, or instant messaging. These URLs redirect users to the phishing pages, increasing the likelihood of successful phishing attacks.

GitHub Projects

There are several versions of this project available, but none of them are currently working .

  • created by ( The Original Version )

  • created by

  • created by ( shellphish )

  • created by ( You can learn more about this version of project on created by )

  • created by

  • created by ( blackeye-im )

  • created by ( Blackeye-2.0 )

  • created by ( BlackEye-Python )

  • created by ( Blackeye-v2.0 )

  • created by ( Blackeye-for-Windows )

  • created by ( Blackeye-incl-ngrok )

  • created by

  • created by ( BlackManPhishing )

  • created by ( You can learn more about this version of project on created by )

even if there are several versions, none of them function.

Hidden Eye

Overview

HiddenEye is an open-source phishing tool available on GitHub. It is designed for educational and ethical use to demonstrate the techniques and methods employed by attackers in phishing attacks. The tool provides a framework for creating and deploying various phishing campaigns, allowing users to simulate real-world scenarios and understand the risks associated with phishing.

With HiddenEye, users can generate phishing pages for popular websites and services, such as social media platforms, email providers, banking websites, and more. The tool offers different phishing methods, including credential harvesting, keylogging, and two-factor authentication (2FA) bypass techniques.

Hidden Eye features

  • Wide range of templates: Hidden Eye offers a diverse set of phishing templates for platforms like Facebook, Instagram, Google, LinkedIn, and more. These templates closely resemble the original login pages, increasing the effectiveness of phishing attacks.

  • Customization options: Users can customize the phishing templates to make them more convincing and tailored to their targets. They can modify the appearance, content, and fields of the phishing pages to appear legitimate and attract unsuspecting victims.

  • Credential capture: Hidden Eye captures the credentials entered by victims on the phishing pages. It stores the collected data, allowing the attacker to access and misuse it for unauthorized activities.

  • Phishing URL generation: Hidden Eye generates unique phishing URLs that can be shared with the target victims through various communication channels. These URLs redirect users to phishing pages, enhancing the chances of successful phishing attacks.

GitHub Projects

There are several versions of this project available, but none of them are currently working.

even if there are several versions, none of them function.

New Tools that function currently

Zphisher

Overview

Zphisher is an open-source phishing tool designed for educational and research purposes. It allows users to create and deploy phishing pages to perform simulated phishing attacks. Phishing is a social engineering technique used to deceive individuals into revealing sensitive information such as usernames, passwords, or credit card details by posing as a legitimate entity.

It is important to note that phishing is an illegal activity when used without the explicit consent of the targeted individuals or organizations. Zphisher should only be used in controlled environments for educational purposes, such as raising awareness about phishing techniques and training individuals to recognize and avoid such attacks.

Using Zphisher or any other phishing tool for malicious purposes is illegal and unethical. It is essential to always respect the privacy and security of others and comply with applicable laws and regulations when conducting any security-related activities.

Features of Zphisher

  1. Multiple Phishing Page Templates: Zphisher provides a variety of pre-designed phishing page templates mimicking popular websites and services. These templates can be customized to create convincing phishing pages tailored to the target audience.

  2. Automated Phishing Campaigns: With Zphisher, users can automate phishing campaigns by generating a phishing link and sending it to their targets. The tool tracks and records the entered credentials, providing the user with the harvested information.

  3. Credential Logging: Zphisher includes a credential logging feature that captures and logs the entered credentials on the phishing page. This allows users to analyze and retrieve the harvested data for educational or research purposes.

  4. Customization Options: Users can customize various aspects of the phishing pages, such as the appearance, content, and behavior, to make them appear more legitimate and increase the chances of successful phishing attacks.

  5. Reporting and Analytics: Zphisher provides basic reporting and analytics features, allowing users to view statistics on the success of their phishing campaigns, including the number of visits, submitted credentials, and more.

Download From GitHub

PyPhisher

The ultimate phishing tool in Python Includes popular websites like facebook, twitter, instagram, github, reddit, gmail and many others.

This project is now a part of MaxPhisher.

SocialFish

SocialFish is an open-source tool available on GitHub that can be used for advanced phishing attacks and social engineering campaigns. It is important to note that using such tools for malicious or unethical purposes is strictly prohibited.

SocialFish allows users to create convincing phishing pages of popular social media platforms, email services, and other online platforms. These phishing pages can be used to trick unsuspecting users into providing their login credentials or sensitive information.

However, it is crucial to understand that engaging in any form of unauthorized access or phishing is illegal and unethical. The use of SocialFish or similar tools should only be for educational purposes, such as raising awareness about phishing attacks and demonstrating the potential risks to individuals and organizations.

created by ( HiddenEye-Legacy )

created by ( HiddenEye )

created by ( HiddenEye-DarkSecDevelopers )

created by .

created by ( You can learn more about this version of project on created by )

You can learn more about this Tool on created by .

This Tools has 2 Versions : ,

This GitHub Repository
thelinuxchoice
This GitHub Repository
whiteeagle0
This GitHub Repository
thelinuxchoice
This GitHub Repository
x3rz
This YouTube Video/Tutorial
NetworkChuck
This GitHub Repository
ZodiDuToit
This GitHub Repository
thewickedkarma
This GitHub Repository
rbrahul2020
This GitHub Repository
M4cs
This GitHub Repository
bhikandeshmukh
This GitHub Repository
HiDe-Techno-Tips
This GitHub Repository
d3c0d3er
This GitHub Repository
hicodersofficial
This GitHub Repository
manashma
This GitHub Repository
An0nUD4Y
This YouTube Video/Tutorial
Null Byte
This GitHub Repository
DarkSecDevelopers
This GitHub Repository
DarkSecDevelopers
This GitHub Repository
Soldie
This GitHub Repository
Morsmalleo
This GitLab Repository
An0nUD4Y
This YouTube Video/Tutorial
CyberMattLee
This YouTube Video/Tutorial
InfoSec Pat
SF's mobile controller
SF's old version(Ngrok integrated)
LogoGitHub - htr-tech/zphisher: An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !GitHub
LogoGitHub - KasRoudra/PyPhisher: Easy to use phishing tool with 77 website templates. Author is not responsible for any misuse.GitHub
LogoGitHub - UndeadSec/SocialFish: Phishing Tool & Information CollectorGitHub