ZPhisher
Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish. But I have not fully copied it. I have upgraded it & cleared the Unnecessary Files. It has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal. It also has 4 Port Forwarding Tools .
apt update
apt install git php openssh curl -y
git clone https://github.com/htr-tech/zphisher
cd zphisher
chmod +x zphisher.sh
bash zphisher.sh
Or ; Use Single Command
apt update && apt install git php curl openssh -y && git clone https://github.com/htr-tech/zphisher && cd zphisher && chmod +x zphisher.sh && bash zphisher.sh
Also Read – InstaSave : Python Script To Download Images, Videos & Profile Pictures From Instagram
You can easily install zphisher in Termux by using tur-repo
$ pkg install tur-repo
$ pkg install zphisher
$ zphisher .deb files from the Latest Release*_termux.deb.deb file by executingapt install <your path to deb file> Or$ dpkg -i <your path to deb file> $ apt install -fdocker pull htrtech/zphisherdocker pull ghcr.io/htr-tech/zphisher:latest$ curl -LO https://raw.githubusercontent.com/htr-tech/zphisher/master/run-docker.sh $ bash run-docker.shdocker run --rm -ti htrtech/zphisher auth directory.You can access the Zphisher tool on GitHub.
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…