Skip to content

Pollute phishing kits with fake credentials

License

Notifications You must be signed in to change notification settings

andpalmier/phishflood

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

phishflood

phishflood

Software License Go Report Card follow on Twitter

This is a proof of concept to pollute phishing kits with fake data. An old version of this project was discussed in this blog post, I decided to use this repository to add some features.

PLEASE NOTE: At the moment, phishflood is compatible only with the phishing kits mentioned in the blog post, and with some others which follows the same structure. This is due to a naif approach for the data generation (it's a PoC 😅).

Usage

After downloading the repository, build the project:

$ make phishflood

This will create a folder build and an executable phishflood. You can then run the executable with the following flags:

  • -dmax (int): maximum delay between consecutive requests, in seconds (default 3600).
  • -dmin (int): minimun delay between consecutive requests, in seconds (default 10).
  • -goroutines (int): number of goRoutines (default 10).
  • -proxies (string): one or multiple proxies; specify the schema (http default) and port, and use ',' as a separator.
  • -seed (int64): seed used for random data generation, random if not specified.
  • -url (string): domain name or url, if schema is not specified, https is assumed.
  • -ua (string): User Agent to be used, using Chrome on iPhone by default.

Todo

  • Improve code organization
  • Add custom User Agent flag
  • Remove colly dependency
  • Started gofakeit integration for fake data generation
  • Add compatibility with known phishing kits