In this post, we are going to see about a phishing tool called rm-phisher, this tool is a little different from the previous phishing tools in that now chrome can find the phishing link very easily, so the Cloudflare tool is used instead of the ngrok tool in this tool.
Thus the phishing link is created by Cloudflare and your target is easily trusted and undetected by the chrome browser.
- Latest and updated login pages.
- Masked URL support – [http only]
- Beginners friendly
- Tunneling options
- Localhost (visit 127.0.0.1:8080)
- Cloudflare (default, automated and undetected)
Install RM-phisher tool in termux
First, you need to type the below command in your termux to download the rm-phisher tool.
git clone https://github.com/ritheshnayak/RM-phisher.git
Now change the directory to phishing tool so execute the below command on your Termux terminal
After changing the directory run the bash script to run this tool and execute the command given below. Then choose which phishing page you want
After you choose your phishing page you will get a phishing link that you can copy and send to your victim.
If your victim opens the phishing link you sent them, it will appear as shown in the image below
Now your victim can click on the link sent by you and do any typing and you can know all of them through your terminal.
I hope you find this post useful and if you have any queries you can ask me through the command section below.
Any actions and or activities related to RM-phisher are solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.
This toolkit contains materials that can be potentially damaging or dangerous to social media. Refer to the laws in your province/country before accessing, using, or in any other way utilizing this in the wrong way.
This Tool is made for educational purposes only! Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!
It only demonstrates “how phishing works”. You shall not misuse the information to gain unauthorized access to someone’s social media. However, you may try out this at your own risk.