Skip to content

0xb11a1/phishyfish

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PhishyFish ><(((º>

During one of the RedTeam assessments with my team, we wanted a quick way to bypass OTP for Microsoft Outlook. We wanted it to be manually operated and customized as we were doing targeted phishing attacks not only against Outlook but also VPN and other portals that support SSO, so I built quick Javascript code in a couple of hours to do that. The previous code had a lot of limitations. This project is the long-enhanced version of it.

PhishyFish is meant to be a framework, the user_frontend project is an example of how to implement the user interface and interact with the API. You can alter it or create your own project based on it.

PhishyFish_demo.mp4

Features / TODO:

  • Add Auto_mode: will try to automate the the process of OTP grabbing and submitting
  • On Auto_mode: saving user cookies and taking a screenshot for office and outlook pages
  • simplify the installation process
  • Add caddy as a reverse proxy
  • Auto SSL generating using Let's Encrypt
  • Add IP classification for detecting and preventing scanners
  • Add version history for all users submittion
  • Add more features in Auto_mode

Installation

Make sure docker & docker-compose are installed in your system

Clone the project

git clone https://github.com/0xb11a1/phishyfish.git
cd phishyfish

Build and run the framework :

./start.sh [ -p password ] [ -s slack_webhookURL ] [-d domain_for_SSL_generation ]

About

Phishing Framework for OTP codes

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published