Categories: Kali Linux

SocialFish To Easily And Quickly Create Phishing Sites

Ultimate phishing tool with Ngrok integrated. Using this tool anyone can easily and quickly create a phishing sites. The utilization of the SocialFish is COMPLETE RESPONSIBILITY of the END-USER. Engineers expect NO risk and are NOT in charge of any abuse or harm caused by this program.

Also Read Wifiphisher Can Attack Wi-Fi By Unknowingly Connecting To An Attacker-Controlled Access Point

Prerequisites For SocialFish

  • Python 2.7
  • Wget from Python
  • PHP
  • sudo

Tested On

  • Kali Linux – Rolling Edition
  • Linux Mint – 18.3 Sylvia
  • Ubuntu – 16.04.3 LTS
  • MacOS High Sierra

CLONE

git clone https://github.com/UndeadSec/SocialFish.git

RUNNING

cd SocialFish
sudo pip install -r requirements.txt
python SocialFish.py

Available Pages

  • Facebook:
    • Traditional Facebook login page.
    • Advanced login with Facebook.
  • Google:
    • Traditional Google login page.
    • Advanced login with Facebook.
  • LinkedIn:
    • Traditional LinkedIn login page.
  • Github:
    • Traditional Github login page.
  • Stackoverflow:
    • Traditional Stackoverflow login page.
  • WordPress:
    • Similar WordPress login page.
  • Twitter:
    • Traditional Twitter login page.

Screenshot

 

Video Demo

 

DISCLAIMER

“IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.” Taken from LICENSE.

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

14 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

14 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago