Kali Linux

ZPhisher : Automated Phishing Tool For Pentesters

Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish. But I have not fully copied it. I have upgraded it & cleared the Unnecessary Files. It has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal. It also has 4 Port Forwarding Tools .

Installation

apt update
apt install git php openssh curl -y
git clone https://github.com/htr-tech/zphisher
cd zphisher
chmod +x zphisher.sh
bash zphisher.sh

Or ; Use Single Command

apt update && apt install git php curl openssh -y && git clone https://github.com/htr-tech/zphisher && cd zphisher && chmod +x zphisher.sh && bash zphisher.sh

Also Read – InstaSave : Python Script To Download Images, Videos & Profile Pictures From Instagram

Installation (Termux)

You can easily install zphisher in Termux by using tur-repo

$ pkg install tur-repo
$ pkg install zphisher
$ zphisher

Installation via “.deb” file

  • Download .deb files from the Latest Release
  • If you are using termux then download the *_termux.deb
  • Install the .deb file by executingapt install <your path to deb file> Or$ dpkg -i <your path to deb file> $ apt install -f

Run on Docker

  • Docker Image Mirror:
    • DockerHub :docker pull htrtech/zphisher
    • GHCR :docker pull ghcr.io/htr-tech/zphisher:latest
  • By using the wrapper script run-docker.sh$ curl -LO https://raw.githubusercontent.com/htr-tech/zphisher/master/run-docker.sh $ bash run-docker.sh
  • Temporary Containerdocker run --rm -ti htrtech/zphisher
    • Remember to mount the auth directory.

Features

  • Latest Login Pages !
  • New Instagram Auto Follower Page !
  • All types of Bugs Fixed !
  • Useful for Beginners !

You can access the Zphisher tool on GitHub.

R K

Recent Posts

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

19 minutes ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

14 hours ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

15 hours ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

1 day ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

2 days ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

2 days ago