SniperPhish is a phishing toolkit for pentester or security professionals to enhance user awareness by simulating real-world phishing attacks. SniperPhish helps to combine both phishing emails and phishing websites you created to centrally track user actions. The tool is designed in a view of performing professional phishing exercise and would be reminded to take prior permission from the targeted organization to avoid legal implications.
Installation
Default login – Username: admin
Password: sniperphish
Main Features
Screenshots
Creating Web-Email Campaign – Quick Guide
In short, we create web tracker -> Add the web tracker to the phishing website -> create mail campaign with a link pointing to the phishing website -> start mail campaign.
Creating a web tracker:
Web Tracker -> New Tracker
for your phishing site. The “Web Pages” tab lists the pages you want to track.Creating an Email campaign:
Email Campaign ->
User Group
and add target usersEmail Campaign -> Sender List
and configure Mail server detailsEmail Campaign -> Email Template
and create mail template. Here, you can to link your phishing website based on the web tracker you created. For that, click on Insert
menu from email template editor and chose Link to Web Tracker
. Select your web tracker from the pop-up window and insert it.Email Campaign -> Campaign List -> New Mail Campaign
and select/fill the fields to create the campaign.Note: SniperPhish tracks your phishing website only if the page is called by appending cid
parameter (ie. ?cid={{CID}}
) at the end. For example opening http://yourphishingsite.com/login?cid=abcd
will be tracked, but not http://yourphishingsite.com/login
. Above 3rd step does this by default.
Viewing combined Web-Email Result
Go to Web-MailCamp Dashboard -> Select Campaign
. Then selct the web tracker and email campaign you created.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…