SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering phishing exercises.
Also Read Ghost Phisher – Wireless & Ethernet Attack Software Application
Run the below command to install the SPF tool;
pip install dnspython
pip install pycrypto
apt-get install python-twisted-web
apt-get install phantomjs
git clone --recursive https://github.com/tatanus/SPF.git usage: spf.py [-h] [-f <list.txt>] [-C <config.txt>] [--all] [--test] [-e]
[-g] [-s] [--simulate] [-w] [-W] [-d <domain>]
[-c <company's name>] [--ip <IP address>] [-v] [-y]
optional arguments:
-h, --help show this help message and exit
-d <domain> domain name to phish
-c <company's name> name of company to phish
--ip <IP address> IP of webserver defaults to [192.168.1.124]
-v, --verbosity increase output verbosity
input files:
-f <list.txt> file containing list of email addresses
-C <config.txt> config file
enable flags:
--all enable ALL flags... same as (-e -g -s -w)
--test enable all flags EXCEPT sending of emails... same as
(-e -g --simulate -w -y -v -v)
-e enable external tool utilization
-g enable automated gathering of email targets
-s enable automated sending of phishing emails to targets
--simulate simulate the sending of phishing emails to targets
-w enable generation of phishing web sites
-W leave web server running after termination of spf.py
misc:
-y automatically answer yes to all questions
cd spf
python spf.py --test -d example.com or to just test the websites:
cd spf
python web.py default.cfg
DerbyCon 2015 Video
BsidesLV 2015 Video
BsidesKnox 2015 Video
Video of sample usage
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…