Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Clone phishing

      1 post in this topic

      Create an account or sign in to comment

      You need to be a member in order to leave a comment

      Create an account

      Sign up for a new account in our community. It's easy!

      Register a new account

      Sign in

      Already have an account? Sign in here.

      Sign In Now
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Introduction
          Hidden Eye is an all in one tool that can be used to perform a variety of online attacks on user accounts. It’s well loaded, therefore it can be used as keylogger (keystroke logging), phishing tool, information collector, social engineering tool, etc.
          Hidden Eye Logo
          Disclaimer: Use this tool for educational purposes only.
          Hidden Eye: Advanced Phishing Tool [Android-Support-Available]
          As a modern phishing tool, Hidden Eye is very good at what it does. The perfect combination of all its functional components gives it an upper hand when attacking accounts. By using brute force attacks it can effectively access the user’s personal information. Hidden Eye can easily crack user passwords and can also collect other personal data belonging to the victim.
          Depending on the attack vector selected you can easily hack user accounts such as Facebook, Twitter, Instagram, Snapchat and many others. It can be used to carry out phishing on 30+ pages. The tool can also run on android devices through the UserLand app or Termux app.
          Features:
              Can perform live attacks (IP, geolocation, country, etc.)
              Captures victim’s keystrokes (using keylogger function)
              Serveo URL type selection (selects between RANDOM URL and CUSTOM URL)
              Numerous phishing pages (Facebook, Twitter, Instagram, Dropbox, Reddit, WordPress, Yahoo, and many more)
              Android support (Termux/UserLand)
          Supported Platforms:
              Linux (Tested on: Kali Linux, Parrot OS, Ubuntu, Arch Linux, Black Arch, OS X High Sierra, etc.)
              Android (Termux/UserLand)
          Prerequisites:
          This tool can’t be run effectively is some components are not in place, so make sure that you’ve installed the following:
              Python 3     sudo     Wget from Python     PHP
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and executes phishing engagements and security awareness training.
          The idea behind gophish is simple – make industry-grade phishing training available to everyone. “Available” in this case means two things –
              Affordable – Gophish is open-source software that is completely free for anyone to use.     Accessible – Gophish is written in the Go programming language. This has the benefit that gophish releases are compiled binaries with no dependencies. In a nutshell, this makes installation as simple as “download and run”! Changelog v0.8
              This release fixes a bunch of bugs, adds a few features, and lays the groundwork for really cool features to come.     RBAC Support     This release includes initial support for Role-Based Access Control (RBAC). Specifically, it introduces global roles that separates admins from non-admins. You can find more information here.     Users API     Users with the admin role have access to the user management API. This API allows you to create and manage users programmatically. You can find documentation for this API here.     Added Docker Support     We’ve added a Dockerfile so that you can build Gophish in a container. We’ll be uploading an official Docker image at gophish/gophish shortly.     Code Refactoring     While this isn’t a user-facing change, it’s a big one. We’ve refactored a bunch of the code to be cleaner and more structured. This will help new developers coming into Gophish to get up and running more quickly.     Those are the big changes, but that’s certainly not everything! You can find a full changelog here.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Download:

          Hidden Content
          Give reaction to this post to see the hidden content. Password:
          level23hacktools.com
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. In this video I showcase usage of the Setoolkit, available in Kali Linux. I go into how to create and use the credential harvester, inorder to help you understand how to make a phishing website.
          MrTech
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Shellphish - Phishing Tool For 18 Social Media (Instagram, Facebook, Snapchat, Github, Twitter...)
          Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab, Pinterest.
          This script uses some webpages generated by SocialFish Tool (https://github.com/UndeadSec/SocialFish)
          Instagram webpage generated by An0nUD4Y (@its_udy) (https://github.com/An0nUD4Y)
          Phishing Tool for Instagram, Facebook, Twitter, Snapchat, Github, Yahoo, Protonmail, Google, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Pinterest +1 customizable
          Features:
          Port Forwarding using Ngrok or Serveo
          Legal disclaimer:
          Usage of Shellphish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

          Hidden Content
          Give reaction to this post to see the hidden content.