This repository contains a sample tool intended solely for educational and awareness purposes regarding the dangers of phishing. The creation and use of phishing tools are illegal and unethical activities. The author of this repository neither encourages nor endorses the practice of phishing.
Phishing is a malicious technique used by cybercriminals to obtain confidential information, such as passwords and personal data, by deceiving users. This repository aims to educate about the risks associated with phishing and highlight the importance of cyber awareness. Instead of conducting real attacks, this tool simulates the process of a phishing attack in a controlled manner (allowing the selection of the recipient), so users understand how these attacks work and learn to protect themselves.
The use of this tool should be strictly limited to controlled environments and with the explicit consent of the involved parties. It is not permitted to use this tool to send phishing emails without explicit authorization.
- Never click on suspicious links.
- Always verify the authenticity of received emails.
- Keep your security software up to date.
- Use two-factor authentication whenever possible.
This manual is designed to guide users through the installation and execution of the tool. Whether you're a beginner or an experienced user, this guide will help you navigate through Phished effortlessly.
Before proceeding, it is crucial to understand that the misuse of this tool may violate laws and ethical principles. By executing the tool, you agree to use it ethically, responsibly, and only in controlled environments, with proper consent.
- Python 3.12.x installed
- Git installed
- Permissions to execute scripts in the environment
Open a terminal or command prompt.
`git clone https://github.com/Mxggot/SMTP-Phished.git`
`cd SMTP-Phished`
Navigate to the directory where the script is located.
Run the script using the command `python3 phished.py` or `./phished.py`.
If the script failed to run you should try setting permissions by typing `chmod +x phished.py`.
Upon running the tool, you will be presented with the Main Menu. This menu offers the following options:
1) Single Target: Simulated phishing email sending to a single address.
2) Multiple Targets: Simulated phishing email sending to a list of addresses.
3) Help: Display additional information about the tool.
99) Exit: Terminate the tool execution.
When selecting option 1 or 2, provide the requested information, such as email addresses, fake sender, email subject, and message path.
NOTE: The list of EMAILS must be in
.txt
format, with emails separated by;
(semicolon).
NOTE: The message to be sent must be in a
.txt
file, but its writing must be inHTML
.
Provide the SMTP server, login, and password when prompted. Make sure this information is valid and that you have permission to use the provided SMTP server.
The tool will send simulated phishing emails only to the provided addresses, causing no real harm. This allows understanding phishing signs and enhancing awareness. After sending the emails, the tool will provide feedback on the success or failure of the process.
If you found this tool useful and want to support its development, consider buying me a coffee through PayPal:
Your support is greatly appreciated! ☕️🙏