• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2022
  • May
  • 22
  • Zphisher-GUI-Back_office – A Zphisher GUI Back-Office Plugin

Zphisher-GUI-Back_office – A Zphisher GUI Back-Office Plugin

May 22, 2022 Comments Off on Zphisher-GUI-Back_office – A Zphisher GUI Back-Office Plugin
Zphisher-GUI-Back_office - A Zphisher GUI Back-Office Plugin cybersecurity ethical hacking hack android hack app hack wordpress hacker news hacking hacking tools for windows keylogger kit kitploit password brute force penetration testing pentest pentest android pentest linux pentest toolkit pentest tools spy tool kit spyware tools

DISCLAIMER

This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using,or in any other way utilizing this in a wrong way.

This Tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!

It only demonstrates “how phishing works”. You shall not misuse the information to gain unauthorized access to someones social media. However you may try out this at your own risk.

Zphisher-GUI-Back_office

This is a plugin where you can see in real time the victims of your phishing campaign, you just have to change the Zphisher files for these. Easy!

This tool creates a graphical back office for the zphish tool (although it is not 100% necessary to use this tool, you can use these files by hosting it on a localhost).

If you don’t have Zphisher installed on your computer: https://github.com/htr-tech/zphisher

Video

 

Instructions

  • You need to deploy the server with a template, identify in the “login.html” file the name of the two post parameters.
  • Modify the post parameters of the “login.php” file of the plugin with the original identifier of Zphisher (line 7 and 8).
  • Replace all deployed http server files with plugin files (except login.html).

If you have an api key from haveibeenpwned.com you have to insert it in the file “api_key.txt” in the directory “programa interprete”, in this way the back-office will tell you which accounts are exposed on the internet.

No need 100% Zphisher

You can also use this plugin by hard sharing the project by Ngrok from your LocalHost without using Zphisher.

This plugin comes with a sample login page, in this case from Office 365, you can use any Zphisher template for this plugin, using Ngrok to share your localhost.

Where are the results saved?

The results will be saved in /programa_interprete/user_data.csv

Back office properties

-You can see if the inserted account is exposed on the internet: 

-Total number of accounts and “Pwned” accounts: 

-Evaluation of security in the passwords of all the inserted accounts:

Download Zphisher-GUI-Back_office

Post navigation

Former BitMEX CEO Sentenced to Probation for AML Violations
Ubuntu & Tesla hacked in Pwn2Own Vancouver 2022

Related Articles

Concealed Code Execution: Tools and technical write-ups describing attacking techniques

Concealed Code Execution: Tools and technical write-ups describing attacking techniques

- Hack Tools
August 16, 2022
VLANPWN - VLAN Attacks Toolkit

VLANPWN – VLAN Attacks Toolkit

- Hack Tools
August 16, 2022
dnstwist v20201228 releases: Domain name permutation engine for detecting typo squatting, phishing and corporate espionage

dnstwist v20220815 releases: Domain name permutation engine for detecting typo squatting, phishing and corporate espionage

- Hack Tools
August 16, 2022
hacker gadgets
hacker phone covers

Recent Posts

Concealed Code Execution: Tools and technical write-ups describing attacking techniques

Concealed Code Execution: Tools and technical write-ups describing attacking techniques

August 16, 2022
VLANPWN - VLAN Attacks Toolkit

VLANPWN – VLAN Attacks Toolkit

August 16, 2022
dnstwist v20201228 releases: Domain name permutation engine for detecting typo squatting, phishing and corporate espionage

dnstwist v20220815 releases: Domain name permutation engine for detecting typo squatting, phishing and corporate espionage

August 16, 2022
RPCMon: RPC Monitor tool based on Event Tracing for Windows

RPCMon: RPC Monitor tool based on Event Tracing for Windows

August 16, 2022
Woman Sentenced to 151 Months in Prison for Selling GHB

Woman Sentenced to 151 Months in Prison for Selling GHB

August 16, 2022
riskscanner: Open source multi-cloud security compliance scanning platform

riskscanner: Open source multi-cloud security compliance scanning platform

August 15, 2022

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW