- Phishing modules. (modules/)
- Support for more web sites.
- Code cleanup.
- Instructions for more platforms.
- bash scripts for ettercap/dsniff (tools/)
Usage of Weeman for attacking targets without prior mutual consent is illegal. Weeman developer not responsible to any damage caused by Weeman.
HTTP server for phishing in python. Usually you will want to run Weeman with DNS spoof attack. (see dsniff, ettercap).
- Create fake html page.
- Wait for clients
- Grab the data (POST).
- Try to login the client to the original page ๐
- Python <= 2.7.
- Python BeautifulSoup 4
- Archlinux - sudo pacman -S python2-beautifulsoup4
- Ubuntu/Linuxmint - sudo apt-get install python-bs4
- Fedora < 22 - sudo yum install python-beautifulsoup4
- Fedora >= 22 - sudo dnf install python-beautifulsoup4
- For another OS: - sudo pip install beautifulsoup4
- Linux (any)
- Mac (Tested)
- Windows (Not tested)
[!] If weeman runs on your platform (Windows) (or not), please let me know.
run weeman in quiet mode:
./weeman.py -q
-
For port 80 you need to run Weeman as root!
-
Host to clone (Ex: www.social-networks.local)
set url http://www.social-networks.local
- Set form action URL (Example:
<code><form action = "TAKE THIS URL"></code>
)
set action_url http://www.social-networks.local/sendlogin
- The port Weeman server will listen
set port 2020
- Start the server
run
The settings will be saved for the next time you run weeman.py.
Contributions are very welcome!
- fork the repository
- clone the repo (git clone [email protected]:USERNAME/weeman.git)
- make your changes
- push the repository
- Add yourself in contributors.txt
Thank you - and happy contributing!
git clone git://github.com/Hypsurus/weeman
Copyright 2015 (C) Hypsurus [email protected] License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html.