Skip to content
/ weeman Public
forked from samyoyo/weeman

HTTP Server for phishing in Python

License

Notifications You must be signed in to change notification settings

xdryzen/weeman

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Weeman - http server for phishing

Weeman

DISCLAIMER

Usage of Weeman for attacking targets without prior mutual consent is illegal. Weeman developer not responsible to any damage caused by Weeman.

About

HTTP server for phishing in python. Weeman has support for most of the (bigest) websites.

Usually you will want run Weeman with DNS spoof attack. (see dsniff, ettercap).

Weeman will do the following steps:

  1. Create fake html page.
  2. Wait for clients
  3. Grab the data (POST).
  4. Try to login the client to the original page 😃

Requirements

  • Python <= 2.7.
  • Python BeautifulSoup 4

Install BeautifulSoup

  • Archlinux - sudo pacman -S python2-beautifulsoup4
  • Ubuntu/Linuxmint - sudo apt-get install python-bs4
  • For another OS: - sudo pip install beautifulsoup4

Platforms

  • Linux (any)
  • Mac (Not tested)
  • Windows (Not tested)

[!] If weeman runs on your platform (Mac/Windows), please let me know.

Usage

Just type help

Run server:

set url http://localhost

  • "<"form action = "TAKE THIS URL">"(View the site source and take the URL)

set action_url http://localhost/sendlogin

  • The port Weeman server will listen

set port 2020

  • Start the server

run

The settings will be saved for the next time you run weeman.py.

Get Weeman

            git clone git://github.com/Hypsurus/weeman

github : yunanaexploit/weeman

Copyright 2015 (C) Hypsurus hypsurus@mail.ru.

License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html.

About

HTTP Server for phishing in Python

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%