• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
KaliTut

KaliTut

Kali Linux tutorial and Linux system tips

  • Home
  • Raspberry Pi
  • Privacy Policy
  • About us

Blackeye Phishing Tool

Last Updated on July 19, 2020 by Kalitut 10 Comments

BLACKEYE The most complete Phishing Tool, with 32 templates +1 customizable

Blackeye Phishing Tool

Description
BLACKEYE is an upgrade from original ShellPhish Tool (https://github.com/thelinuxchoice/shellphish) by thelinuxchoice under GNU LICENSE. It is the most complete Phishing Tool, with 32 templates +1 customizable. WARNING: IT ONLY WORKS ON LAN! This tool was made for educational purposes!

Legal disclaimer:
Usage of BlackEye for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.

Usage:

git clone https://github.com/thelinuxchoice/blackeye
cd blackeye
bash blackeye.sh

Coded by: @linux_choice (https://github.com/thelinuxchoice/blackeye)
Give me the credits if you copy ANY part from this code. Don’t be NOOB!!
Upgraded by: @suljot_gjoka (@whiteeagle0)
Credits (Copyright) Don’t copy this code without giving the credits!!!
Phishing Pages generated by An0nUD4Y (https://github.com/An0nUD4Y):
Instagram

Phishing Pages generated by Social Fish tool (UndeadSec) (https://github.com/UndeadSec/SocialFish):
Facebook,Google,SnapChat,Twitter,Microsoft

Phishing Pages generated by @suljot_gjoka:
PayPal,eBay,CryptoCurrency,Verizon,Drop Box,Adobe ID,Shopify,Messenger,TwitchMyspace,Badoo,VK,Yandex,devianART

Filed Under: Penetration Testing Tools

Comments

  1. Unknown says

    July 25, 2019 at 4:53 am

    When i run the server it gives me a blank ipadress? what do i do

    Reply
  2. Aleem says

    November 29, 2020 at 8:32 am

    What is username
    And password
    I did I have to do there

    Reply
    • NamelessPride says

      June 18, 2022 at 8:03 pm

      Hello, Due to the file no longer existing, it askes you to sign in to make sure you are the owner of this directory because the file is now private that’s why

      Reply
  3. ghost says

    December 29, 2020 at 1:50 am

    i click on numbers and its another thing showing, its not allowing me to choose numbers

    Reply
  4. ghost says

    January 5, 2021 at 6:53 pm

    I click the NUMBERS its not showing what do i need to do again to make it proper

    Reply
  5. ghost says

    January 5, 2021 at 7:05 pm

    I choose an option and it didn’t press the number in stead another thing was showing entirely

    Reply
  6. DSMAX109878 says

    April 7, 2021 at 5:27 pm

    blackeye is down i made a backup but whenever i select an option it goes invalid

    Reply
    • Kabeer says

      April 17, 2021 at 2:58 pm

      which backup are you using to use a phishing tool? After the downfall of blackeye, x3rz, script shell, It is almost impossible to do a phishing attack.

      Reply
  7. Kabeer says

    April 17, 2021 at 2:59 pm

    which backup are you using to use a phishing tool? After the downfall of blackeye, x3rz, script shell, It is almost impossible to do a phishing attack.

    Reply
  8. chandan kumar b s says

    June 28, 2021 at 5:28 am

    it is asking for username and password. What should be username and password?

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow us

  • Facebook
  • Twitter
  • YouTube

Categories

  • Android pentesting tools
  • Arduino
  • Books
  • Darknet
  • database
  • General
  • Github Tools
  • Hacking
  • Kali Linux
  • Linux
  • Linux Commands
  • Network Administrator
  • Penetration Testing
  • Penetration Testing Tools
  • PowerShell
  • Raspberry Pi
  • resources
  • Review
  • Termux
  • Tutorials
  • Ubuntu
  • Uncategorized
  • Video Tutorials
  • vmware
  • WiFi Adapter
  • WiFi Pentesting
  • Wireless Router
  • Wireshark

Recent Posts

  • Hijacked Wi-Fi? Thorough explanation of hacking techniques
  • Windows PowerShell tutorial for beginners
  • Learn to Hack Steps from Beginner to Hacker
  • PowerShell Tutorial – GUIDE introduction with basics
  • Top Hacking Tools
  • Home
  • About us
  • Privacy Policy
  • Affiliate disclaimer

Copyright © 2023