https://github.com/secnnet/phishing-post
https://github.com/secnnet/phishing-post
anti-phishing-measures backdoored-form credentials-collector cybersecurity-awareness ethical-hacking login-backend phishing-script php-script user-data-collection web-security
Last synced: about 1 year ago
JSON representation
- Host: GitHub
- URL: https://github.com/secnnet/phishing-post
- Owner: secnnet
- License: mit
- Created: 2023-07-16T07:37:28.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2023-10-19T09:24:47.000Z (over 2 years ago)
- Last Synced: 2024-11-10T12:17:49.878Z (over 1 year ago)
- Topics: anti-phishing-measures, backdoored-form, credentials-collector, cybersecurity-awareness, ethical-hacking, login-backend, phishing-script, php-script, user-data-collection, web-security
- Language: PHP
- Homepage:
- Size: 12.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Phishing Script
PHP script for credential collection via a backdoored HTML form.
### Disclaimer:
For educational purposes only. Unauthorized use is illegal. Ensure proper authorization.
### Description:
Collects credentials from manipulated HTML forms. Features include logging, redirection, and handling of multiple password retries.
### Configuration:
1. Open `Phishing Post.php`.
2. Modify variables:
- `$harvest_filename`: Data filename.
- `$post_url`: Target post URL.
- `$resend_post_data`: Resend data to redirect address?
- `$redirect`: Redirection after data collection.
- `$redirect_type`: Redirection type.
- `$wrong_password_url`: "Wrong password" redirection URL.
- `$password_retry`: Login attempts before redirection.
- `$log_everyone`: Log all visitors?
- `$log_format`: Logging format.
- `$csv_separator`: CSV log separator.
- `$show_meta_data`: Include metadata in logs?
- `$exclude_visitors`: Exclude based on VISITOR_ID.
### Usage:
1. Configure as per above.
2. Upload `Phishing Post.php` to web server.
3. Create backdoored HTML form pointing to script.
4. Deploy or send form for phishing.
### Legal Notice:
Malicious or unauthorized use is prohibited. Author & OpenAI not liable for misuse. Adhere to all applicable laws & regulations.
### Support:
For questions, contact the script author or refer to the OpenAI community.
### License:
MIT