Disclaimer
Any actions and or activities related to Zphisher are solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.
This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using, or in any other way utilizing this in the wrong way.
This Tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!
It only demonstrates "how phishing works". You shall not misuse the information to gain unauthorized access to someone's social media. However, you may try out this at your own risk.
First, of first, you will need a hacking environment installed on your mobile or computer. If you are using this tool from a mobile phone, then you should install Termux on your device. Here we can perform our operation in the following steps:
1. Installation
To install Zphisher on your device simply copy and paste the following code on your terminal.
$ git clone --depth=1 https://github.com/htr-tech/zphisher.git
2. Setup
After the successful installation of the tool, simply go into the directory ;
$ cd zphsiher
Then open zphisher.sh using the following command;
$ bash zphisher.sh
Note: To successfully execute this command you should better get rooted on your device. To enter root, simply enter the command "sudo -i" or "su root" and enter your user password.
On the first launch, It'll install the dependencies. The setup process may take some time to get executed. Wait for some minutes.
3. Ready to exploit
After execution, you may see Zphisher CLI where the different types of social media are listed. Choose one of them by their rankings.
4. Choosing a Server
You will be redirected to choose the server to generate the link. You should choose the Cloudflared server for fast and better results.
5. Choosing GUI or Login Pages
You can choose any GUI for the process. It will be better to choose a suitable one in which the victim will suspect less.
6. Hacking Successful
After sending generated link to the victim, wait for the victim to log in to the page through the link. As soon the victim log in to the page, you will get his Username and Password immediately.
Warning: You shall not misuse the information to gain unauthorized access to someone's social media.
Comments