Kali Linux

ZPhisher : Automated Phishing Tool For Pentesters

Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish. But I have not fully copied it. I have upgraded it & cleared the Unnecessary Files. It has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal. It also has 4 Port Forwarding Tools .

Installation

apt update
apt install git php openssh curl -y
git clone https://github.com/htr-tech/zphisher
cd zphisher
chmod +x zphisher.sh
bash zphisher.sh

Or ; Use Single Command

apt update && apt install git php curl openssh -y && git clone https://github.com/htr-tech/zphisher && cd zphisher && chmod +x zphisher.sh && bash zphisher.sh

Also Read – InstaSave : Python Script To Download Images, Videos & Profile Pictures From Instagram

Installation (Termux)

You can easily install zphisher in Termux by using tur-repo

$ pkg install tur-repo
$ pkg install zphisher
$ zphisher

Installation via “.deb” file

  • Download .deb files from the Latest Release
  • If you are using termux then download the *_termux.deb
  • Install the .deb file by executingapt install <your path to deb file> Or$ dpkg -i <your path to deb file> $ apt install -f

Run on Docker

  • Docker Image Mirror:
    • DockerHub :docker pull htrtech/zphisher
    • GHCR :docker pull ghcr.io/htr-tech/zphisher:latest
  • By using the wrapper script run-docker.sh$ curl -LO https://raw.githubusercontent.com/htr-tech/zphisher/master/run-docker.sh $ bash run-docker.sh
  • Temporary Containerdocker run --rm -ti htrtech/zphisher
    • Remember to mount the auth directory.

Features

  • Latest Login Pages !
  • New Instagram Auto Follower Page !
  • All types of Bugs Fixed !
  • Useful for Beginners !

You can access the Zphisher tool on GitHub.

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

6 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

6 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago