Search the Community

Showing results for tags 'phishing'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 34 results

  1. Advanced Phishing Tool For Instagram, With Custom Templates Built According To Your Needs. Author:[Whit3H4tJr] Features: Port Forwarding with Ngrok Live Attack IP Grabber Location Capture [hide][Hidden Content]]
  2. TikTok Fake Followers Phishing Script Installation 1.Upload this zip file any webhosting site.I recommend 000webhost.com 2.Extract zip file in home directory and delete the zipfile 3.Edit install.php and enter your email address and notedown username and password Prerequisites: Web hosting site Basic knowledge on using computer Legal Disclaimer: Usage of this tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. [hide][Hidden Content]]
  3. itsMe

    Tiktok Phishing

    Host this file on any webhosting like 000webhosting for free hosting [HIDE][Hidden Content]]
  4. Auto Phishing form-based websites. This tool can automatically detect inputs on html form-based websites to create a phishing page. Features: Auto detect device Port Forwarding by Ngrok IP Tracker Legal disclaimer: Usage of Formphish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. [HIDE][Hidden Content]]
  5. Host these files on any webhosting . Free webhosting - 000webhost.com.All the logs will be stored on victimslog.txt.Use some social engineering to fool your victim . Happy Phishing [HIDE][Hidden Content]]
  6. itsMe

    DeepSea Phishing Gear

    DeepSea phishing gear aims to help RTOs and pentesters with the delivery of opsec-tight, flexible email phishing campaigns carried out on the outside as well as on the inside of a perimeter. Goals Operate with a minimal footprint deep inside enterprises (Internal phish delivery). Seamlessly operate with external and internal mail providers (e.g. O365, Gmail, on-prem mail servers) Quickly re-target connectivity parameters. Flexibly add headers, targets, attachments Correctly format and inline email templates, images and multipart messages. Use content templates for personalization Account for various secure email communication parameters Clearly separate artifacts, mark databases and content delivery for multiple (parallel or sequential) phishing campaigns. Help create content with minimal dependencies. Embedded tools to support Markdown->HTML->TXT workflow. | 45 config lines is all you need to consistently send a decent phish ... [HIDE][Hidden Content]]
  7. itsMe

    Advance Phishing Tool 2.0

    TECHNIQUE When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him. AVAILABLE TUNNELLING OPTIONS LOCALHOST NGROK ([Hidden Content]) TESTED ON FOLLOWING:- Kali Linux - 2020.1a (version) Parrot OS - Rolling Edition (version) Ubuntu - 18.04 (version) Arch Linux Termux App Advance Phishing Tool 2.0 Add 16 New Phishing Pages with Latest Version Fix Ngrok Problem Add World First Tiktok Phishing Page [HIDE][Hidden Content]]
  8. Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ] Modern Phishing Tool With Advanced Functionality PHISHING | KEYLOGGER | INFORMATION_COLLECTOR | ALL_IN_ONE_TOOL | SOCIALENGINEERING TO BE USED FOR EDUCATIONAL PURPOSES ONLY The use of the HiddenEye & its resources/phishing-pages is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program. Also we inform you that some of your your actions may be ILLEGAL and you CAN NOT use this software to test person or company without WRITTEN PERMISSION from them. AVAILABLE TUNNELLING OPTIONS** LOCALHOST LOCALXPOSE ([Hidden Content]) SERVEO ([Hidden Content]) NGROK ([Hidden Content]) LOCALTUNNEL (Package Version) ([Hidden Content]) OPENPORT ([Hidden Content]) PAGEKITE ([Hidden Content]) TESTED ON FOLLOWING:- Kali Linux - Rolling Edition Parrot OS - Rolling Edition Linux Mint - 18.3 Sylvia Ubuntu - 16.04.3 LTS MacOS High Sierra Arch Linux Manjaro XFCE Edition 17.1.12 Black Arch Userland App (For Android Users) Termux App (For Android Users) Complete code rewrite New structure New dependency More compatibility Easier to understand or modify Works much faster Should resolve some old/abandoned bugs Started integrating localization system Started integrating themes system Added EULA requirement [HIDE][Hidden Content]]
  9. dEEpEst

    FACEBOOK PHISHING 2020

    [Hidden Content]
  10. Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and executes phishing engagements and security awareness training. The idea behind gophish is simple – make industry-grade phishing training available to everyone. “Available” in this case means two things – Affordable – Gophish is open-source software that is completely free for anyone to use. Accessible – Gophish is written in the Go programming language. This has the benefit that gophish releases are compiled binaries with no dependencies. In a nutshell, this makes installation as simple as “download and run”! Changelog v0.10.1 Gophish Just Got Better. We’re excited to announce v0.10.1. This release significantly improves the performance of sending emails, adds some features and fixes bugs. Here’s just a couple of the exciting changes. [HIDE][Hidden Content]]
  11. EvilApp - Phishing Attack Using An Android App To Grab Session Cookies For Any Website (ByPass 2FA) Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass 2-factor authentication protection. EvilApp brings as an example the hijacking and injection of cookies for authenticated instagram sessions. [HIDE][Hidden Content]]
  12. Lockphish v1.0 Lockphish it's the first tool (05/13/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link. Features: Lockscreen phishing page for Windows, Android and iPhone Auto detect device Port Forwarding by Ngrok IP Tracker [HIDE][Hidden Content]]
  13. Modern Phishing Tool With Advanced Functionality PHISHING | KEYLOGGER | INFORMATION_COLLECTOR | ALL_IN_ONE_TOOL | SOCIALENGINEERING DISCLAIMER TO BE USED FOR EDUCATIONAL PURPOSES ONLY The use of the HiddenEye & its resources/phishing-pages is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program. Also we inform you that some of your your actions may be ILLEGAL and you CAN NOT use this software to test person or company without WRITTEN PERMISSION from them. AVAILABLE TUNNELLING OPTIONS** LOCALHOST LOCALXPOSE ([Hidden Content]) SERVEO ([Hidden Content]) NGROK ([Hidden Content]) LOCALTUNNEL (Package Version) ([Hidden Content]) OPENPORT ([Hidden Content]) PAGEKITE ([Hidden Content]) QUICK FIX [0.5.4] @An0nUD4Y An0nUD4Y released this 5 days ago This Release made to cover the issues Occured During/After the Github Mistakely Disable the Repo. QUICK CHANGES MADE Ngrok Fixed Few More Tunnels Got Fixed Installation Interface improved Few Phishing Pages Fixed Small issues Fixed Created A Backup Repo At GitLab (Check Readme) [HIDE][Hidden Content]]
  14. [+] Disclaimer : NexPhisher is an automated Phishing tool made for Termux & Linux .The phishing Pages are Taken from Zphisher under GNU General Public License v3.0 . This tool has 37 Phishing Page Templates of 30 Websites.There are 5 Port Forwarding Options including Localhost !! If you copy then give me the Credits ! [!] I am not Responsible for any Misuse of this tool . Use at your Own Risk [!] [+] Features : [+] Latest Login Pages ! [+] New Instagram Auto Follower Page ! [+] New Port Forwarding Options ! [+] Perfect for All Devices ! [HIDE][Hidden Content]]
  15. itsMe

    PHISHING SITES [Update]

    [HIDE][Hidden Content]]
  16. TECHNIQUE When victim enter his credentials, you need to go to original website and use those credentials to send real OTP to victim. Once he enter that OTP such OTP will also be there with you and you will be allowed to login the account before him. [HIDE][Hidden Content]]
  17. itsMe

    Recreator Phishing

    PROFESSIONAL TOOL ORIENTED IN THE RECREATION OF PHISHING WEBSITE SCENARIOS [HIDE][Hidden Content]]
  18. [+] Disclaimer : Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish . But I have not fully copied it . I have upgraded it & cleared the Unnecessary Files . Zphisher has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal . It also has 4 Port Forwarding Tools. [+] Features: [+] Latest Login Pages ! [+] New Instagram Auto Follower Page ! [+] All types of Bugs Fixed ! [+] Useful for Beginners ! [HIDE][Hidden Content]]
  19. REVOLTSHING v.2 - FRAMEWORK . IS A COMPLETE PHISHING SYSTEM. IT ALLOWS YOU TO CREATE WEBSITES WITH THE OBJECTIVE OF OBTAINING CREDENTIALS Mode Of Execution: apt-get install python3 apt-get install git git clone [HIDE][Hidden Content]] cd RevoltShing bash install.sh python3 Server.py python3 revoltshing.py TERMUX pkg install git git clone [HIDE] [Hidden Content]] cd RevoltShing pkg install python pkg install wget pip3 install wget pip3 install bs4 pip install bs4 python3 Server.py python3 revoltshing.py
  20. dEEpEst

    Weeman - http server for phishing

    About HTTP server for phishing in python. Weeman has support for most of the (bigest) websites. Usually you will want run Weeman with DNS spoof attack. (see dsniff, ettercap). Weeman will do the following steps: Create fake html page. Wait for clients Grab the data (POST). Try to login the client to the original Page [Hidden Content]
  21. Phishing Pages Pack 32 Scripts In HTML and Php Link: [Hidden Content]
  22. Gophish: Open-Source Phishing Toolkit Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training. [HIDE][Hidden Content]]
  23. dEEpEst

    Clone Phishing

    [Hidden Content]
  24. dEEpEst

    INSTAGRAM PAGE

    [PHISHING] INSTAGRAM PAGE Instagram phishing page. Logs are saving in logs.txt. Looks: Download: [Hidden Content]
  25. Introduction Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc. Hidden Eye Logo Disclaimer: Use this tool for educational purposes only. Hidden Eye: Advanced Phishing Tool [Android-Support-Available] As a modern phishing tool, Hidden Eye is very good at what it does. The perfect combination of all its functional components gives it an upper hand when attacking accounts. By using brute force attacks it can effectively access the user’s personal information. Hidden Eye can easily crack user passwords and can also collect other personal data belonging to the victim. Depending on the attack vector selected you can easily hack user accounts such as Facebook, Twitter, Instagram, Snapchat and many others. It can be used to carry out phishing on 30+ pages. The tool can also run on android devices through the UserLand app or Termux app. Features: Can perform live attacks (IP, geolocation, country, etc.) Captures victim’s keystrokes (using keylogger function) Serveo URL type selection (selects between RANDOM URL and CUSTOM URL) Numerous phishing pages (Facebook, Twitter, Instagram, Dropbox, Reddit, WordPress, Yahoo, and many more) Android support (Termux/UserLand) Supported Platforms: Linux (Tested on: Kali Linux, Parrot OS, Ubuntu, Arch Linux, Black Arch, OS X High Sierra, etc.) Android (Termux/UserLand) Prerequisites: This tool can’t be run effectively is some components are not in place, so make sure that you’ve installed the following: Python 3 sudo Wget from Python PHP [HIDE][Hidden Content]]