All Projects → kdhacker1995 → Social-Fish-v2.0

kdhacker1995 / Social-Fish-v2.0

Licence: GPL-3.0 license
Phishing Tool

Programming Languages

HTML
75241 projects
PHP
23972 projects - #3 most used programming language

Projects that are alternatives of or similar to Social-Fish-v2.0

Maskphish
Give a Mask to Phishing URL like a PRO.. A MUST have tool for Phishing.
Stars: ✭ 370 (+1441.67%)
Mutual labels:  phishing, kali-linux, hacking-tool
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+4616.67%)
Mutual labels:  phishing, kali-linux, hacking-tool
VirusX5
The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-37.5%)
Mutual labels:  phishing, kali-linux, hacking-tool
18-plus-Facebook-Phishing
18+Facebook-Phishing.Hack Facebook
Stars: ✭ 58 (+141.67%)
Mutual labels:  phishing, hacking-tool
Adb Toolkit
ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!
Stars: ✭ 217 (+804.17%)
Mutual labels:  kali-linux, hacking-tool
Phonia
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (+820.83%)
Mutual labels:  kali-linux, hacking-tool
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+7500%)
Mutual labels:  kali-linux, hacking-tool
nero-phishing-server
An full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (+350%)
Mutual labels:  phishing, hacking-tool
FreeFire-Phishing
Free Fire Phishing Tool ID Hack Tool For Online Hacking
Stars: ✭ 140 (+483.33%)
Mutual labels:  phishing, hacking-tool
Urlcrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (+525%)
Mutual labels:  phishing, kali-linux
Shark
Future Of Phishing With less delay
Stars: ✭ 150 (+525%)
Mutual labels:  phishing, kali-linux
termux-wifi
Bash script which installs and runs the Fluxion tool inside Termux, a wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
Stars: ✭ 406 (+1591.67%)
Mutual labels:  phishing, kali-linux
Tool X
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.
Stars: ✭ 3,361 (+13904.17%)
Mutual labels:  kali-linux, hacking-tool
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+675%)
Mutual labels:  kali-linux, hacking-tool
ApeX
Using Social Engineering To Obtain WiFi Passwords
Stars: ✭ 87 (+262.5%)
Mutual labels:  phishing, kali-linux
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+491.67%)
Mutual labels:  kali-linux, hacking-tool
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+5145.83%)
Mutual labels:  kali-linux, hacking-tool
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+425%)
Mutual labels:  kali-linux, hacking-tool
Andspoilt
Run interactive android exploits in linux.
Stars: ✭ 101 (+320.83%)
Mutual labels:  kali-linux, hacking-tool
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+95.83%)
Mutual labels:  phishing, hacking-tool

Social-Fish-v2.0

Official Written by: Alisson Moretto | Twitter: @A1S0N_ Github: @A1S0N

OTHER CONTRIBUTORS :-
koushik suthar: [ Add microsoft, Instagram ] | GitHub: https://github.com/kdhacker1995
cloaksec: [ Add Twitter ]
adiranas: [ Added macOS support ]

PREREQUISITES :-
Python 2.7
Wget from Python
PHP
sudo

TESTED ON :-
Kali Linux - Rolling Edition
Linux Mint - 18.3 Sylvia
Ubuntu - 16.04.3 LTS
MacOS High Sierra

CLONE :-
official Without Instagram and Microsoft: "git clone https://github.com/UndeadSec/SocialFish.git"
kdhacker1995 With Instagram and Microsoft: "git clone https://github.com/kdhacker1995/Social-Fish-v2.0.git"

How To Use:
service apache2 stop
cd sf
sudo pip install -r require.txt
python SFv2.0.py

AVAILABLE PAGES

+ Facebook:
	Traditional Facebook login page. <br>
	Advanced login with Facebook.

+ Google:
	Traditional Google login page.<br>
	Advanced login with Facebook.

+ LinkedIn:
	Traditional LinkedIn login page.

+ Github:
	Traditional Github login page.

+ Stackoverflow:
	Traditional Stackoverflow login page.

+ Wordpress:
	Similar Wordpress login page.

+ Twitter:
	Traditional Twitter login page.

+ Instagram:
	Traditional Google login page.

+ Microsoft:
	Traditional Google login page.

DISCLAIMER:
TO BE USED FOR EDUCATIONAL PURPOSES ONLY The use of the SocialFish is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program.

How do I find phishing pages generated by this tool?

Search with this dork:
intitle:"Phishing Page generated by Koushik Suthar in this website."

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].