Skip to content
This repository has been archived by the owner on Mar 31, 2022. It is now read-only.

bufgix/hookup

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Welcome to Hookup 💻

License: MIT Twitter: bufgix

New generation phishing tool.

logo

A phishing tool that is written in Python and VueJS

Installation 📀

Step 1


Launch your terminal

λ git clone https://github.com/bufgix/hookup
λ cd hookup

Install dependencies with pip

λ pip install -r requirements.txt

Step 2


Run phishing and GUI server. If you have never launched the program before, it will ask for username and password.

λ python run.py
Username: bufgix
Password
[+] Done
 * Serving Flask app "hookup" (lazy loading)
 * Environment: production
   WARNING: This is a development server. Do not use it in a production deployment.
   Use a production WSGI server instead.
 * Debug mode: on
 * Restarting with stat

If everything is ok, you'll see the ngrok page which is shown below img

And now, open your favorite browser then type http://localhost:5000/adminpage for the control panel.

Usage 👨‍💻


img

Login with your username and password (you set them on step 2)

Configure

img

On the configuration panel, you'll see that some fake pages have been already set up. Select the one for your use. "Current Page" part contains the data that victim will see.

Results

img The ngrok URL publishes your local server to the internet. You can get your fake page's URL at the top right corner of the screen(the part which says "Ngrok Url: ".). If your victim types their credientals correctly and pushes the send button, you'll handle the POST payload and results will be shown like the image above.

Author

👤 bufgix

Show your support

Give a ⭐️ if this project helped you!