Home phishing RM-phisher Undetected phishing tool

RM-phisher Undetected phishing tool

undetected phishing tool, not detected by chrome and uses try.Cloudflare instead of ngrok

In this post, we are going to see about a phishing tool called rm-phisher, this tool is a little different from the previous phishing tools in that now chrome can find the phishing link very easily, so the Cloudflare tool is used instead of the ngrok tool in this tool.

Thus the phishing link is created by Cloudflare and your target is easily trusted and undetected by the chrome browser.

Features

  1. Latest and updated login pages.
  2. Masked URL support – [http only]
  3. Beginners friendly
  4. Tunneling options
  5. Localhost (visit 127.0.0.1:8080)
  6. Cloudflare (default, automated and undetected)

Install RM-phisher tool in termux

First, you need to type the below command in your termux to download the rm-phisher tool.

				
					git clone https://github.com/ritheshnayak/RM-phisher.git
				
			
RM-phisher Undetected phishing tool
Output for downloading the rm-phisher tool

Now change the directory to phishing tool so execute the below command on your Termux terminal

				
					cd RM-phisher
				
			
RM-phisher Undetected phishing tool
Output for changing the directory

After changing the directory run the bash script to run this tool and execute the command given below. Then choose which phishing page you want

				
					bash RM-phisher.sh
				
			
RM-phisher Undetected phishing tool
Output for executing the bash script

After you choose your phishing page you will get a phishing link that you can copy and send to your victim.

RM-phisher Undetected phishing tool
Output for getting phishing link

If your victim opens the phishing link you sent them, it will appear as shown in the image below

RM-phisher Undetected phishing tool
Output for victim view

Now your victim can click on the link sent by you and do any typing and you can know all of them through your terminal.

RM-phisher Undetected phishing tool
Output for getting victim username and password

I hope you find this post useful and if you have any queries you can ask me through the command section below.

Disclaimer

Any actions and or activities related to RM-phisher are solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.

This toolkit contains materials that can be potentially damaging or dangerous to social media. Refer to the laws in your province/country before accessing, using, or in any other way utilizing this in the wrong way.

This Tool is made for educational purposes only! Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!

It only demonstrates “how phishing works”. You shall not misuse the information to gain unauthorized access to someone’s social media. However, you may try out this at your own risk.

x

2 Comments

Leave A Reply

Please enter your comment!
Please enter your name here