All Projects → HiDe-Techno-Tips → Blackeye-for-Windows

HiDe-Techno-Tips / Blackeye-for-Windows

Licence: MIT license
This is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Win…

Programming Languages

HTML
75241 projects
CSS
56736 projects
javascript
184084 projects - #8 most used programming language
PHP
23972 projects - #3 most used programming language
hack
652 projects
Batchfile
5799 projects

Projects that are alternatives of or similar to Blackeye-for-Windows

node-cli-boilerplate
🪓 Create node cli with this user friendly boilerplate
Stars: ✭ 17 (-55.26%)
Mutual labels:  command-line-app, command-line-interface
CommandLineParser.Core
💻 A simple, light-weight and strongly typed Command Line Parser made in .NET Standard!
Stars: ✭ 32 (-15.79%)
Mutual labels:  commandline, command-line-interface
main
Mocks Server monorepo
Stars: ✭ 109 (+186.84%)
Mutual labels:  command-line-app, command-line-interface
LordPhish
The most complete phishing tool
Stars: ✭ 158 (+315.79%)
Mutual labels:  phishing, blackeye
Reactopt
A CLI React performance optimization tool that identifies potential unnecessary re-rendering
Stars: ✭ 1,975 (+5097.37%)
Mutual labels:  commandline, command-line-interface
Thechoice
The linux choice collection tools
Stars: ✭ 245 (+544.74%)
Mutual labels:  phishing, hacker
DfmExtractor
Small command line utility which allows you to extract DFM, LFM and FRM forms from executable files compiled by Delphi, Lazarus and CodeTyphon.
Stars: ✭ 22 (-42.11%)
Mutual labels:  commandline, command-line-app
Maskphish
Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Stars: ✭ 370 (+873.68%)
Mutual labels:  phishing, hacker
Ntutils
Various Command Line Utilities Ported to Windows NT
Stars: ✭ 58 (+52.63%)
Mutual labels:  commandline, cmd
Ps Webapi
(Migrated from CodePlex) Let PowerShell Script serve or command-line process as WebAPI. PSWebApi is a simple library for building ASP.NET Web APIs (RESTful Services) by PowerShell Scripts or batch/executable files out of the box.
Stars: ✭ 24 (-36.84%)
Mutual labels:  commandline, cmd
Dark-Phish
Dark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (+50%)
Mutual labels:  phishing, phish
Autopair.fish
Auto-complete matching pairs in the Fish command line.
Stars: ✭ 63 (+65.79%)
Mutual labels:  fish, commandline
Pyinquirer
A Python module for common interactive command line user interfaces
Stars: ✭ 1,151 (+2928.95%)
Mutual labels:  command-line-app, cmd
cmdr
POSIX-compliant command-line UI (CLI) parser and Hierarchical-configuration operations
Stars: ✭ 94 (+147.37%)
Mutual labels:  commandline, command-line-interface
TerableAngler
Angler Tokens -> Gold
Stars: ✭ 12 (-68.42%)
Mutual labels:  fish, fishing
Grayfish
light weight phishing framework with 18+ pages.
Stars: ✭ 101 (+165.79%)
Mutual labels:  fish, phishing
hackerweb-native-2
HackerWeb 2: A read-only Hacker News client.
Stars: ✭ 51 (+34.21%)
Mutual labels:  hacker
pyenv
Pyenv support plugin for fish-shell
Stars: ✭ 62 (+63.16%)
Mutual labels:  fish
dotfiles
Command-line lovers unite! I'm sharing my dotfiles, so you don't have to be me and spend years tweaking configuration files for the best developer experience. Enjoy!
Stars: ✭ 38 (+0%)
Mutual labels:  fish
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (+10.53%)
Mutual labels:  phishing

Blackeye for Windows

View in Website

What is this?

This is a Phishing tool. Phishing is a type of hacking also called credential harvesting. It creates fake websites for victims to login which saves their login info which includes IP, User-Agent, Username and Password to a file in the computer running Blackeye. This tool has been there for Linux and even Android via Termux. I converted it to Windows.

These are the options:

Usage of BlackEye for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.

Support Me:

How to use:

  • Just download this and extract it. Run blackeye.bat from the extracted folder and it will guide you through everything. Just read everything carefully while running it.

    • Or using Curl (Bundled with Windows 10 1803):

      curl -LJ https://github.com/HiDe-Techno-Tips/Blackeye-for-Windows/releases/latest/download/Blackeye-for-Windows.zip -o blackeye.zip
      tar -xf blackeye.zip
      del blackeye.zip
      cd Blackeye-for-Windows-main
      blackeye.bat
      
    • Or using Git (Must Install in Windows):

      git clone https://github.com/HiDe-Techno-Tips/Blackeye-for-Windows.git
      cd Blackeye-for-Windows
      blackeye.bat
      
  • If you are having any problem, feel free to ask me about the problem by clicking here.

Special Thanks to:

  • @thelinuxchoice
    • Initial code for Linux.

       

  • @suljot_gjoka
    • PayPal, eBay, CryptoCurrency, Verizon, DropBox, Adobe ID, Shopify, Messenger, Twitch, Myspace, Badoo, VK, Yandex and DevianART Phishing Pages.

       

  • @An0nUD4Y
    • Instagram Phishing Page.

       

  • @UndeadSec
    • Facebook, Google, SnapChat, Twitter and Microsoft Phishing Pages from SocialFish.

       

  • @stedolan
    • Created jq.

      Other Softwares used by Blackeye for Windows:

    • PHP used to publish phishing pages to localhost.
    • ngrok used to tunnel localhost to the Internet.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].