Akshay-Arjun / 69phisher

🔱 [ Phishing Made Easy ] 🔱. Simple and beginner friendly automated phishing page creator.
GNU General Public License v3.0
277 stars 47 forks source link
airbnb-phishing awesome-hacking cloudflare hacking kali kali-linux kali-linux-hacking phishing phishing-attacks phishing-kit phishing-sites termux termux-hacking undetectable
Logo

69phisher

A beginners friendly, Automated phishing tool with 30+ templates.

Update V1.2 : Airbnb phishing created & added with premium design >_<

Report Bug  ·  Request Feature

GitHub stars GitHub forks GitHub license


To do :

Add Browser in the browser mode. Learn more about BITB attack https://www.makeuseof.com/what-is-browser-in-the-browser-attack/ and https://github.com/mrd0x/BITB .

Features

Screenshots

Menu

image

Masked Url:

image

Share the link and grab details

image

Installation

Just, Clone this repository -
$ git clone https://github.com/Akshay-Arjun/69phisher.git
Change to cloned directory -
$ cd 69phisher
$ chmod 777 69phisher.sh
$ bash 69phisher.sh

69phisher requires following programs to run properly -

All the dependencies will be installed automatically when you run 69phisher for the first time.

Supported Platform : Termux, Ubuntu/Debian/Kali/Parrot, Arch Linux/Manjaro, Fedora

Special Thanks :

Star History

Star History Chart

Disclaimer

Any actions and or activities related to 69phisher(from zphisher) is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.

This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using,or in any other way utilizing this in a wrong way.

This Tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!

It only demonstrates "how phishing works". You shall not misuse the information to gain unauthorized access to someones social media. However you may try out this at your own risk.