Cyber-Anonymous / Dark-Phish

A Powerful Phishing Tool with 50+ phishing templates. For more about Dark-Phish tool please visit the website.
https://cyberanonymousofficial.blogspot.com/2023/11/dark-phish.html
GNU General Public License v3.0
214 stars 44 forks source link
a-complete-phishing-tool advance-phishing an-automated-phishing-tool automated-phishing-tool cyber-anonymous dark-phish otp-phish otp-phishing penetration-testing phish phishing phishing-tool powerful-phishing-tool python3 social-engineering toolkit

Dark-Phish

Empowering Ethical Phishing for Security Assessment.

Dark-Phish Logo

Dark-Phish v2.3.0

**Dark-Phish** is a specialized phishing tool created for educational and security testing purposes. It provides users with the capability to simulate phishing attacks, enabling the assessment of system vulnerabilities and user awareness. ## Features - **Multiple Tunneling Options**: Choose from various methods for flexible phishing simulation. - **Auto-saved Credentials**: Victim credentials are stored automatically. - **Credential Management**: Easily access and manage saved credentials. - **Clone Existing Website**: The Clone feature copies a website’s login page for phishing simulations, capturing credentials when users log in. - **Create Phishing Pages**: The Create feature provides an HTML editor to build phishing pages, allowing full control over design and functionality. - **Custom Phishing Templates**: The Custom feature provides a pre-built HTML template that can be easily modified to create personalized phishing pages. - **OTP Capture**: Efficiently collect one-time passwords for improved assessment capabilities. - **URL Obfuscation:** Dark-Phish conceals phishing URLs, making them appear trustworthy and less suspicious. ## Tested on - Kali Linux - Termux ## Installation ```bash apt install python3 curl php git openssh nodejs npm python3-tk -y ``` ```bash pip3 install requests wget pyshorteners ``` ```bash git clone https://github.com/Cyber-Anonymous/Dark-Phish.git cd Dark-Phish ``` ## Usage *Before using Dark-Phish, ensure you have the necessary packages installed as mentioned in the installation section.* - Run Dark-Phish ```bash python3 dark-phish.py ``` - For help and usage information ```bash python3 dark-phish.py -h ``` - To access saved credentials ```bash python3 dark-phish.py -r ``` ## Help ```bash python3 dark-phish.py -h Name: Dark-Phish Usage: python3 dark-phish.py [-h] [-H HOST] [-p PORT] [-u] [-v] [-r] Version: 2.3.0 Options: -h, --help Show this help massage. -H HOST, --host HOST Specify the host address [Default : 127.0.0.1] . -p PORT, --port PORT Web server port [Default : 8080] . -u, --update Check for updates. -v, --version Show version number and exit. -r, --retrieve Retrieve saved credentials. ``` ## OTP Capture Technique 1. When a victim enters their credentials on the phishing page, the attacker immediately receives this information. 2. The attacker, using the victim's credentials, logs into the legitimate website. 3. The genuine website sends an actual OTP to the victim. 4. Believing it's legitimate, the victim enters the OTP on the phishing page. 5. The attacker intercepts the OTP, gaining access to the victim's credentials and logging in first. ## Available tunnels 1. Localhost 2. Ngrok 3. Cloudflared 4. LocalXpose 5. Serveo 6. Localtunnel ## Dark-Phish ![](core/image1.png) ![](core/image2.png) ## Thanks to TheLinuxChoice ## Disclaimer ***Dark-Phish is intended for educational and testing purposes only. Any use of this tool for illegal or unethical activities is strictly prohibited. The authors and contributors are not responsible for any misuse or damage caused by Dark-Phish. Use it responsibly and ensure compliance with all applicable laws and regulations in your jurisdiction.***