{"id":1696,"date":"2018-06-21T18:31:58","date_gmt":"2018-06-21T13:01:58","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=1696"},"modified":"2018-06-21T18:31:58","modified_gmt":"2018-06-21T13:01:58","slug":"spf-speedphish-framework","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/","title":{"rendered":"SPF &#8211; SpeedPhish Framework For Phishing Exercises"},"content":{"rendered":"<p>SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering phishing exercises.<\/p>\n<h2><span style=\"color: #008000;\"><strong>Requirements For SPF<\/strong><\/span><\/h2>\n<ol>\n<li>dnspython<\/li>\n<li>twisted<\/li>\n<li>PhantomJS<\/li>\n<\/ol>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span>\u00a0<a href=\"https:\/\/kalilinuxtutorials.com\/ghost-phisher-wireless-attack\/\" target=\"_blank\" rel=\"noopener\">Ghost Phisher \u2013 Wireless &amp; Ethernet Attack Software Application<\/a><\/strong><\/p>\n<h2><span style=\"color: #008000;\"><strong>How to install SPF ?<\/strong><\/span><\/h2>\n<p>Run the below command to install the SPF tool;<\/p>\n<pre><code><span style=\"color: #008000;\"><strong>pip install dnspython\npip install pycrypto\n\napt-get install python-twisted-web\napt-get install phantomjs\n\ngit clone --recursive https:\/\/github.com\/tatanus\/SPF.git<\/strong><\/span><\/code><\/pre>\n<h2><span style=\"color: #008000;\"><strong>R<span class=\"SDZsVb\" tabindex=\"0\" role=\"link\" data-term-for-update=\"running\" data-ved=\"0ahUKEwjjts7OqeTbAhWKfisKHeR6BNMQ_SoINTAA\">unning\u00a0<\/span>SPF <\/strong><\/span><\/h2>\n<pre><code><span style=\"color: #008000;\"><strong>usage: spf.py [-h] [-f &lt;list.txt&gt;] [-C &lt;config.txt&gt;] [--all] [--test] [-e]\n              [-g] [-s] [--simulate] [-w] [-W] [-d &lt;domain&gt;]\n              [-c &lt;company's name&gt;] [--ip &lt;IP address&gt;] [-v] [-y]\n\noptional arguments:\n  -h, --help           show this help message and exit\n  -d &lt;domain&gt;          domain name to phish\n  -c &lt;company's name&gt;  name of company to phish\n  --ip &lt;IP address&gt;    IP of webserver defaults to [192.168.1.124]\n  -v, --verbosity      increase output verbosity\n\ninput files:\n  -f &lt;list.txt&gt;        file containing list of email addresses\n  -C &lt;config.txt&gt;      config file\n\nenable flags:\n  --all                enable ALL flags... same as (-e -g -s -w)\n  --test               enable all flags EXCEPT sending of emails... same as\n                       (-e -g --simulate -w -y -v -v)\n  -e                   enable external tool utilization\n  -g                   enable automated gathering of email targets\n  -s                   enable automated sending of phishing emails to targets\n  --simulate           simulate the sending of phishing emails to targets\n  -w                   enable generation of phishing web sites\n  -W                   leave web server running after termination of spf.py\n\nmisc:\n  -y                   automatically answer yes to all questions\n<\/strong><\/span><\/code><\/pre>\n<h2><span style=\"color: #008000;\"><strong>Execution:<\/strong><\/span><\/h2>\n<pre><code><strong><span style=\"color: #008000;\">cd spf\npython spf.py --test -d example.com<\/span><\/strong><\/code><\/pre>\n<p><strong>or to just test the websites:<\/strong><\/p>\n<pre><span style=\"color: #008000;\"><strong><code><span style=\"color: #008000;\">cd spf<\/span>\n<span style=\"color: #008000;\">python web.py default.cfg\n<\/span><\/code><\/strong><\/span><\/pre>\n<h2><span style=\"color: #008000;\"><strong>Sample Video<\/strong><\/span><\/h2>\n<p><strong>DerbyCon 2015 Video<\/strong><\/p>\n<div class=\"youtube-embed\" data-video_id=\"uyUyD1hwL9k\"><iframe loading=\"lazy\" title=\"Break Me07 Phishing Groing from Recon to Creds Adam Compton Eric Gershman\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/uyUyD1hwL9k?feature=oembed&#038;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p><strong>BsidesLV 2015 Video<\/strong><\/p>\n<div class=\"youtube-embed\" data-video_id=\"TtgJ3DaMtAo\"><iframe loading=\"lazy\" title=\"PG13 Phishing Going from Recon to Credentials Adam Compton Eric Gershman\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/TtgJ3DaMtAo?feature=oembed&#038;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p><strong>BsidesKnox 2015 Video<\/strong><\/p>\n<div class=\"youtube-embed\" data-video_id=\"85QQwOduH6A\"><iframe loading=\"lazy\" title=\"Track 105 Phishing Going from Recon to Credentials Adam Compton Eric Gershman\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/85QQwOduH6A?feature=oembed&#038;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p><strong>Video of sample usage<\/strong><\/p>\n<div class=\"youtube-embed\" data-video_id=\"wMPlO41lo80\"><iframe loading=\"lazy\" title=\"SpeedPhishing Framework - SPF\" width=\"640\" height=\"480\" src=\"https:\/\/www.youtube.com\/embed\/wMPlO41lo80?feature=oembed&#038;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p><a href=\"https:\/\/github.com\/tatanus\/SPF\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering phishing exercises. Requirements For SPF dnspython twisted PhantomJS Also Read\u00a0Ghost Phisher \u2013 Wireless &amp; Ethernet Attack Software Application How to install SPF ? Run the below command to install the SPF tool; [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1255,2501,3186,3187],"class_list":["post-1696","post","type-post","status-publish","format-standard","hentry","category-kali","tag-framework","tag-phishing","tag-speedphish","tag-spf"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SPF - SpeedPhish Framework For Phishing Exercises<\/title>\n<meta name=\"description\" content=\"SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SPF - SpeedPhish Framework For Phishing Exercises\" \/>\n<meta property=\"og:description\" content=\"SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-21T13:01:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"SPF &#8211; SpeedPhish Framework For Phishing Exercises\",\"datePublished\":\"2018-06-21T13:01:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/\"},\"wordCount\":123,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"keywords\":[\"Framework\",\"Phishing\",\"SpeedPhish\",\"SPF\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/\",\"name\":\"SPF - SpeedPhish Framework For Phishing Exercises\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"datePublished\":\"2018-06-21T13:01:58+00:00\",\"description\":\"SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SPF - SpeedPhish Framework For Phishing Exercises","description":"SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/","og_locale":"en_US","og_type":"article","og_title":"SPF - SpeedPhish Framework For Phishing Exercises","og_description":"SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering","og_url":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-06-21T13:01:58+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"SPF &#8211; SpeedPhish Framework For Phishing Exercises","datePublished":"2018-06-21T13:01:58+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/"},"wordCount":123,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","keywords":["Framework","Phishing","SpeedPhish","SPF"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/","url":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/","name":"SPF - SpeedPhish Framework For Phishing Exercises","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","datePublished":"2018-06-21T13:01:58+00:00","description":"SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/spf-speedphish-framework\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32347,"url":"https:\/\/kalilinuxtutorials.com\/spoofcheck\/","url_meta":{"origin":1696,"position":0},"title":"SpoofCheck &#8211; Fortifying Email Defenses By Unmasking Domain Spoofability","author":"Varshini","date":"March 18, 2024","format":false,"excerpt":"A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing. Additionally it will alert if the domain has DMARC configuration that sends mail or HTTP requests on failed SPF\/DKIM emails. Usage: .\/spoofcheck.py [DOMAIN] Domains are spoofable\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivMCF-wPeGKlV0RNr87U61LTZ5BcciahIBmfHi3wDZW7BdzMu0mUYdQ1jncPSZ_Bfn6LMuata5PhKfft85HJvY5KLPDTCGybNL86KiWjmulMGzqSBkny60V0A0yrdX1svR43xyjuWkizlWOL56VHv1UXko6nnKfBP-UuqenNt5fK3vuHxjBtIi1YwkWw4H\/s16000\/SpoofCheck%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivMCF-wPeGKlV0RNr87U61LTZ5BcciahIBmfHi3wDZW7BdzMu0mUYdQ1jncPSZ_Bfn6LMuata5PhKfft85HJvY5KLPDTCGybNL86KiWjmulMGzqSBkny60V0A0yrdX1svR43xyjuWkizlWOL56VHv1UXko6nnKfBP-UuqenNt5fK3vuHxjBtIi1YwkWw4H\/s16000\/SpoofCheck%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivMCF-wPeGKlV0RNr87U61LTZ5BcciahIBmfHi3wDZW7BdzMu0mUYdQ1jncPSZ_Bfn6LMuata5PhKfft85HJvY5KLPDTCGybNL86KiWjmulMGzqSBkny60V0A0yrdX1svR43xyjuWkizlWOL56VHv1UXko6nnKfBP-UuqenNt5fK3vuHxjBtIi1YwkWw4H\/s16000\/SpoofCheck%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivMCF-wPeGKlV0RNr87U61LTZ5BcciahIBmfHi3wDZW7BdzMu0mUYdQ1jncPSZ_Bfn6LMuata5PhKfft85HJvY5KLPDTCGybNL86KiWjmulMGzqSBkny60V0A0yrdX1svR43xyjuWkizlWOL56VHv1UXko6nnKfBP-UuqenNt5fK3vuHxjBtIi1YwkWw4H\/s16000\/SpoofCheck%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivMCF-wPeGKlV0RNr87U61LTZ5BcciahIBmfHi3wDZW7BdzMu0mUYdQ1jncPSZ_Bfn6LMuata5PhKfft85HJvY5KLPDTCGybNL86KiWjmulMGzqSBkny60V0A0yrdX1svR43xyjuWkizlWOL56VHv1UXko6nnKfBP-UuqenNt5fK3vuHxjBtIi1YwkWw4H\/s16000\/SpoofCheck%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEivMCF-wPeGKlV0RNr87U61LTZ5BcciahIBmfHi3wDZW7BdzMu0mUYdQ1jncPSZ_Bfn6LMuata5PhKfft85HJvY5KLPDTCGybNL86KiWjmulMGzqSBkny60V0A0yrdX1svR43xyjuWkizlWOL56VHv1UXko6nnKfBP-UuqenNt5fK3vuHxjBtIi1YwkWw4H\/s16000\/SpoofCheck%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4232,"url":"https:\/\/kalilinuxtutorials.com\/socialfish-phishing-tool\/","url_meta":{"origin":1696,"position":1},"title":"SocialFish : Educational Phishing Tool &#038; Information Collector","author":"R K","date":"March 17, 2019","format":false,"excerpt":"An app to remote control SocialFish. This app is an open-source project to remote control the application, it does not work independently. Also Read - PFQ : Functional Network Framework for Multi-Core Architectures Setting Up Fernando H. E. Bellincanta edited this page 16 hours ago \u00b7 8 revisions PREREQUISITES Python\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35483,"url":"https:\/\/kalilinuxtutorials.com\/flyphish\/","url_meta":{"origin":1696,"position":2},"title":"Flyphish : Mastering Cloud-Based Phishing Simulations For Security Assessments","author":"Varshini","date":"December 23, 2024","format":false,"excerpt":"Flyphish is an Ansible playbook allowing cyber security consultants to deploy a phishing server in the cloud for security assessments. The playbook installs and configures Gophish, Postfix and OpenDKIM on a virtual machine in the cloud. Additionally, for OPSEC purposes, the playbook removes default IOCs (SMTP headers) from Gophish and\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIz7ANmcpU29YYsH2ZTYez5F5HY6EbwsA1ZqS5n3726Y_OtQ5BuyHZnUC-5vycabpBuBUiZKDIucQsrHj3qUys4d-LfcnVEFvSFiKTiva8kbxLiYt0SEyW9FDTkhPUCLHaa3tGKwZILbmRJSDQKmninaty2pTQJm9CrztNv2XRZiRRRmJkjbrgveIGsF3E\/s1600\/Flyphish%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIz7ANmcpU29YYsH2ZTYez5F5HY6EbwsA1ZqS5n3726Y_OtQ5BuyHZnUC-5vycabpBuBUiZKDIucQsrHj3qUys4d-LfcnVEFvSFiKTiva8kbxLiYt0SEyW9FDTkhPUCLHaa3tGKwZILbmRJSDQKmninaty2pTQJm9CrztNv2XRZiRRRmJkjbrgveIGsF3E\/s1600\/Flyphish%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIz7ANmcpU29YYsH2ZTYez5F5HY6EbwsA1ZqS5n3726Y_OtQ5BuyHZnUC-5vycabpBuBUiZKDIucQsrHj3qUys4d-LfcnVEFvSFiKTiva8kbxLiYt0SEyW9FDTkhPUCLHaa3tGKwZILbmRJSDQKmninaty2pTQJm9CrztNv2XRZiRRRmJkjbrgveIGsF3E\/s1600\/Flyphish%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIz7ANmcpU29YYsH2ZTYez5F5HY6EbwsA1ZqS5n3726Y_OtQ5BuyHZnUC-5vycabpBuBUiZKDIucQsrHj3qUys4d-LfcnVEFvSFiKTiva8kbxLiYt0SEyW9FDTkhPUCLHaa3tGKwZILbmRJSDQKmninaty2pTQJm9CrztNv2XRZiRRRmJkjbrgveIGsF3E\/s1600\/Flyphish%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIz7ANmcpU29YYsH2ZTYez5F5HY6EbwsA1ZqS5n3726Y_OtQ5BuyHZnUC-5vycabpBuBUiZKDIucQsrHj3qUys4d-LfcnVEFvSFiKTiva8kbxLiYt0SEyW9FDTkhPUCLHaa3tGKwZILbmRJSDQKmninaty2pTQJm9CrztNv2XRZiRRRmJkjbrgveIGsF3E\/s1600\/Flyphish%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIz7ANmcpU29YYsH2ZTYez5F5HY6EbwsA1ZqS5n3726Y_OtQ5BuyHZnUC-5vycabpBuBUiZKDIucQsrHj3qUys4d-LfcnVEFvSFiKTiva8kbxLiYt0SEyW9FDTkhPUCLHaa3tGKwZILbmRJSDQKmninaty2pTQJm9CrztNv2XRZiRRRmJkjbrgveIGsF3E\/s1600\/Flyphish%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33276,"url":"https:\/\/kalilinuxtutorials.com\/thief-raccoon\/","url_meta":{"origin":1696,"position":3},"title":"Thief Raccoon &#8211; A Comprehensive Guide To Simulating Phishing Attacks For Cybersecurity Education","author":"Varshini","date":"June 10, 2024","format":false,"excerpt":"Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems. This tool is intended to raise awareness about cybersecurity threats and help users understand the importance of security measures like 2FA and password management. Features Phishing simulation for Windows\u2026","rel":"","context":"In &quot;Phishing&quot;","block_context":{"text":"Phishing","link":"https:\/\/kalilinuxtutorials.com\/category\/phishing\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7OM1AFmpyJnhSPbj8m9ukeNd_kfgCxtqFL2ulV798P8sOjPxxQeZaaGg-x8h6a3-8FtZE5xJ_kJc5x6i49iRBYoKEhB4f-jEUhjBquNpsPbiHOanK_5wvdzEGyoy8w_zdZSwLQpVgNDKTxksrecKHFoPnJM5E_yMQgGaJH7h7z0OQuZuzmEANZB_RJsxL\/s16000\/Thief%20Raccoon%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7OM1AFmpyJnhSPbj8m9ukeNd_kfgCxtqFL2ulV798P8sOjPxxQeZaaGg-x8h6a3-8FtZE5xJ_kJc5x6i49iRBYoKEhB4f-jEUhjBquNpsPbiHOanK_5wvdzEGyoy8w_zdZSwLQpVgNDKTxksrecKHFoPnJM5E_yMQgGaJH7h7z0OQuZuzmEANZB_RJsxL\/s16000\/Thief%20Raccoon%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7OM1AFmpyJnhSPbj8m9ukeNd_kfgCxtqFL2ulV798P8sOjPxxQeZaaGg-x8h6a3-8FtZE5xJ_kJc5x6i49iRBYoKEhB4f-jEUhjBquNpsPbiHOanK_5wvdzEGyoy8w_zdZSwLQpVgNDKTxksrecKHFoPnJM5E_yMQgGaJH7h7z0OQuZuzmEANZB_RJsxL\/s16000\/Thief%20Raccoon%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7OM1AFmpyJnhSPbj8m9ukeNd_kfgCxtqFL2ulV798P8sOjPxxQeZaaGg-x8h6a3-8FtZE5xJ_kJc5x6i49iRBYoKEhB4f-jEUhjBquNpsPbiHOanK_5wvdzEGyoy8w_zdZSwLQpVgNDKTxksrecKHFoPnJM5E_yMQgGaJH7h7z0OQuZuzmEANZB_RJsxL\/s16000\/Thief%20Raccoon%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7OM1AFmpyJnhSPbj8m9ukeNd_kfgCxtqFL2ulV798P8sOjPxxQeZaaGg-x8h6a3-8FtZE5xJ_kJc5x6i49iRBYoKEhB4f-jEUhjBquNpsPbiHOanK_5wvdzEGyoy8w_zdZSwLQpVgNDKTxksrecKHFoPnJM5E_yMQgGaJH7h7z0OQuZuzmEANZB_RJsxL\/s16000\/Thief%20Raccoon%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7OM1AFmpyJnhSPbj8m9ukeNd_kfgCxtqFL2ulV798P8sOjPxxQeZaaGg-x8h6a3-8FtZE5xJ_kJc5x6i49iRBYoKEhB4f-jEUhjBquNpsPbiHOanK_5wvdzEGyoy8w_zdZSwLQpVgNDKTxksrecKHFoPnJM5E_yMQgGaJH7h7z0OQuZuzmEANZB_RJsxL\/s16000\/Thief%20Raccoon%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10931,"url":"https:\/\/kalilinuxtutorials.com\/pythem\/","url_meta":{"origin":1696,"position":4},"title":"Pythem &#8211; Penetration Testing Framework","author":"R K","date":"July 17, 2020","format":false,"excerpt":"Pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and security professionals. The tool intended to be used only for acts within the law. I am not liable for any undue and unlawful act practiced by this tool, for more\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5947,"url":"https:\/\/kalilinuxtutorials.com\/hiddeneye-modern-phishing-tool\/","url_meta":{"origin":1696,"position":5},"title":"HiddenEye : Modern Phishing Tool With Advanced Functionality","author":"R K","date":"July 27, 2019","format":false,"excerpt":"HiddenEye is a modern phishing tool with advanced functionality and it also currently have Android support. Now you will have live information about the victims such as : IP ADDRESS, Geolocation, ISP, Country, & many more. TESTED ON FOLLOWING Kali Linux - Rolling EditionParrot OS - Rolling EditionLinux Mint -\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=1696"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1696\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=1696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=1696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=1696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}