Step 1: choose Browser exploit
Step 2: choose phishing websites
This is first method will allow SET to import a list of pre-defined web applications that it can utilize within the attack.
2. Site Cloner
This is second method will completely clone a website of your choosing and allow you to utilize the attack vectors within the completely same web application you were attempting to clone.
3. Custom Import
The third method allows you to import your own website, note that you should only have an index.html when using the import website functionality.
You choose 2nd option site cloner and follow this below image
Once you choose phishing website select payload I choose 1st option
Once you choose payload then you select payload option for reverse connection I choose reverse_tcp and select your port
Now you will get one shareable link share that link to victim once your victim click your link payload will automatically exploit in their system so you can control your victim device remotely.