git clone https://github.com/Tanmay-Tiwaricyber/tphisher.git
Any actions and or activities related to Tphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.
This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using,or in any other way utilizing this in a wrong way.
This Tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!
It only demonstrates “how phishing works”. You shall not misuse the information to gain unauthorized access to someones social media. However you may try out this at your own risk.
- Latest and updated login pages.
- Mask URL support
- Beginners friendly
- Docker support (checkout
- Multiple tunneling options
- Ngrok (With or without hotspot)
- Cloudflared (Alternative of Ngrok)
- Just, Clone this repository –
$ git clone https://github.com/Tanmay-Tiwaricyber/tphisher.git
Change to cloned directory and run
$ cd tphisher $ bash tphisher.sh
Run on Docker
$ docker pull TanmayTiwaricyber/zphisher $ docker run --rm -it Tanmay-Tiwaricyber/zphisher
Tphisher requires following programs to run properly –
All the dependencies will be installed automatically when you run
Tphisherfor the first time.