Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points and deploy various internal networking servers for networking, penetration testing and phishing attacks.
The Software runs on any Linux machine with the programs prerequisites, But the program has been tested on the following Linux based operating systems:
Also Read WiFiJammer – Continuously Jam All Wi-Fi Clients/Routers
The following dependencies can be installed using the Debian package installer command on Debian based systems using “apt-get install program” or otherwise downloaded and installed manually.
Ghost Phisher currently supports the following features:
Run the below command;
root@host:~# dpkg -i ghost-phisher_1.5_all.deb
The source code for the program can be fetched using the following command on terminal
root@host:~# svn checkout http://ghost-phisher.googlecode.com/svn/Ghost-Phisher/
BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and…
ComDotNetExploit is a Proof of Concept (PoC) tool designed to demonstrate the exploitation of Windows…
Trigon is a sophisticated deterministic kernel exploit targeting Apple’s iOS devices, leveraging the CVE-2023-32434 vulnerability.…
Bug bounty report templates are essential tools for streamlining the process of documenting vulnerabilities. They…
FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained…
Carseat is a Python-based tool that replicates the functionality of the well-known security auditing tool,…