Articles Tutorial and Tools SocialFish - Let's Go Phishing

SocialFish – Let’s Go Phishing

-

SocialFish is an open-source phishing tool, integrated with another open source tool – Ngrok, which allows you to easily create a phishing page of most popular websites like Facebook/Instagram/Twitter/Github, etc.

Setting Up SocialFish

PREREQUISITES
  • Python 3.6 or Greater
  • pip3
PYTHON 3 PREREQUISITES
  • flask
  • colorama
  • sqlite3
  • flask_login
  • shutil
  • re
  • os
  • secrets
  • python-nmap
  • smtplib
  • email
  • pylatex
  • qrcode

CLONE

$ git clone https://github.com/UndeadSec/SocialFish.git

SETUP PYTHON3 & PIP3

$ sudo apt-get install python3 python3-pip python3-dev -y

Read more about Python 3: https://www.python.org

Read more about Python Package Installer(PIP): https://pip.pypa.io/en/stable/

SETUP PYTHON3 REQUIREMENTS

$ cd SocialFish
$ python3 -m pip install -r requirements.txt

CHANGE APP SECRET KEY

File: SocialFish/core/config.py

APP_SECRET_KEY = '<CHANGE ME SF>'

Clone this wiki locally

Using SocialFish

RUN SF AND SET YOUR WEB LOGIN
$ cd SocialFish
$ python3 SocialFish.py youruser yourpassword
BROWSE TO http://0.0.0.0:5000
github

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Why Is It Important To Have Intrusion Detection And Prevention ?

This article describes why detection and prevention of burglaries...

The risk is real: attacks on OT infrastructure

Previously, many believed that attacks on an isolated OT...

Gitpaste-12: Linux bot armed with a dozen exploits

Researchers at Juniper Networks have discovered a Linux scripting...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It...

Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !

Network vulnerability assessment analyzes a variety of network issues,...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity,...

You might also likeRELATED
Recommended to you