Skip to content

nasudonguri/weeman

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Weeman - http server for phishing

Weeman

DISCLAIMER

Usage of Weeman for attacking targets without prior mutual consent is illegal. Weeman developer not responsible to any damage caused by Weeman.

About

I wrote this as a tool to test network security (the users), Usually we will run Weeman with dns spoof attack (MITM).

Weeman will do the following steps:

  1. Create fake html page.
  2. Wait for clients
  3. Grab the data (POST).
  4. Try to login the client to the original page 😃

Requirements

  • Python <= 2.7
  • Python BeautifulSoup 4

Install BeautifulSoup

  • Archlinux - sudo pacman -S python2-beautifulsoup4
  • Ubuntu/Linuxmint - sudo apt-get install python-bs4
  • For another OS: - sudo pip install beautifulsoup4

Platforms

  • Linux (any)
  • Mac (Not tested)
  • Windows (Not tested)

If weeman runs on your platform (Mac/Windows), please let me know.

Usage

Just type help

Run server:

set url http:https://localhost

  • "<"form action = "TAKE THIS URL">"(View the site source and take the URL)

set action_url http:https://localhost/sendlogin

  • The port Weeman server will listen

set port 2020

  • Start the server

run

The settings will be saved for the next time you run weeman.py.

Get Weeman

            git clone git:https://github.com/Hypsurus/weeman

Copyright 2015 (C) Hypsurus [email protected].

License GPLv3+: GNU GPL version 3 or later http:https://gnu.org/licenses/gpl.html.

About

HTTP Server for phishing in Python

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%