AdvPhishing : This Is Advance Phishing Tool! OTP PHISHING

AdvPhishing is a advance phishing tool with OTP phishing Bypass.

SPECIAL OTP BYPASS VIDEO WORKED

Social Media HackLink
Installation Termuxhttps://www.youtube.com/watch?v=LO3hX1lLBjI
Whatsapp OTPhttps://www.youtube.com/watch?v=pyB63ym3QYs
Google OTPhttps://www.youtube.com/watch?v=MhSb4My1lZo
Paytm OTPhttps://www.youtube.com/watch?v=3TB_sISTw9U
Instagram OTPhttps://www.youtube.com/watch?v=VmkV1rrw2-w
Phone Pay OTPhttps://www.youtube.com/watch?v=ZgaoLubKBBo
Telegram OTPhttps://www.youtube.com/watch?v=BhGyGkIDhO0

TECHNIQUE

When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him.

TUTORIAL [ KALI ]

INSTALLATION [ TERMUX APP –ANDROID ]

INSTALLATION [ KALI ]

AVAILABLE TUNNELLING OPTIONS

  1. LOCALHOST
  2. NGROK (https://ngrok.com/)

TESTED ON FOLLOWING:-

  • Kali Linux – 2020.1a (version)
  • Parrot OS – Rolling Edition (version)
  • Ubuntu – 18.04 (version)
  • Arch Linux
  • Termux App

PREREQUISITES

  • sudo – [ MUST ]
  • php
  • apache2
  • ngrok Token

LANGUAGE

  • Bash Script

Upcoming Contribution

Royal Hackers

SCREENSHOT

DISCLAIMER

TO BE USED FOR EDUCATIONAL PURPOSES ONLY. The use of the Adv-Phishing is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program.

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago