Sponsored
Soical Engineering

Zphisher – A Automated Phishing Tool

Hey Folks, in this tutorial we are going to talk about another new phishing tool named “Zphisher“. Zphisher is an open source tool, originally designed to carry out phishing attacks through social engineering, with 30 different-2 types of phishing pages through which you can obtain the credentials of a social media account .

Let’s take a look 🙂 !!

Installation

To configure this tool in our system, we have to download it from github. After downloading we do not need to do more because we can directly boot it using the last command.

git clone git://github.com/htr-tech/zphisher.git
cd zphisher
bash zphisher.sh

Hmm 🙂 !! After booting the tool it will look like the image below where you can select any phishing template.

After selecting the template it will ask for port forwarding which you can choose according to your own.

Really 🙂 !! As you can see no one can say that it is a phishing link because it looks like real.

Ok 🙂 !! When the victim opens the link, the interface will open up as below.

Nice 🙂 !! As soon as the victim enters his username and password on the phishing page, he will go to the attacker.

Thus, you can select a phishing template and obtain the credentials of victim accounts by carrying out phishing attacks.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

View Comments

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

3 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

8 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

8 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.