Overview
Phishing attack tools are designed for security professionals to simulate real-world phishing attacks in controlled environments. These tools help organizations:- Test employee awareness and security training effectiveness
- Identify vulnerabilities in email filtering and security controls
- Conduct authorized penetration testing and red team exercises
- Assess social engineering attack surfaces
Featured Tools
Social Engineer Toolkit
Industry-standard penetration testing framework for social engineering
Evilginx2
Advanced MITM phishing framework that bypasses 2FA
PyPhisher
Easy-to-use tool with 77 pre-built website templates
HiddenEye
Modern phishing tool with multiple tunneling services
Available Phishing Tools
Automated Phishing Frameworks
Autophisher RK
Autophisher RK
Description: Automated phishing toolkit for rapid deploymentInstallation:Usage:GitHub: CodingRanjith/autophisher
PyPhisher
PyPhisher
Description: Easy to use phishing tool with 77 website templatesInstallation:Usage:Features:
- 77 pre-built templates for popular services
- Multiple tunneling options (Ngrok, Cloudflared)
- Clean and user-friendly interface
AdvPhishing
AdvPhishing
Description: Advanced phishing tool with OTP phishing capabilitiesInstallation:Usage:GitHub: Ignitetch/AdvPhishing
Social Engineering Frameworks
Social Engineer Toolkit (SET)
Social Engineer Toolkit (SET)
SocialFish
SocialFish
Advanced MITM Phishing
Evilginx2
Evilginx2
Description: Man-in-the-middle attack framework for phishing login credentials and session cookies, bypassing 2-factor authenticationInstallation:Environment Setup:
Add to your Then load it:Usage:Features:
~/.profile:- Bypass 2FA by capturing session cookies
- Custom phishlets for various services
- DNS and certificate handling
Location & Media Phishing
I-See-You
I-See-You
Description: Tool to find exact location of victim through social engineering or phishing engagementInstallation:Usage:Features:
- Expose local servers to Internet
- Decode location coordinates from log files
- Social engineering engagement tracking
SayCheese
SayCheese
Description: Capture webcam shots from target by sending a malicious linkInstallation:Usage:GitHub: hangetzzu/saycheese
QR Code Phishing
QR Code Jacking (OhMyQR)
QR Code Jacking (OhMyQR)
QRLJacking
QRLJacking
Description: OWASP QRLJacking framework for exploiting QR code authenticationInstallation:Usage:GitHub: OWASP/QRLJacking
Specialized Phishing Tools
WifiPhisher
WifiPhisher
BlackEye
BlackEye
Description: The ultimate phishing tool with 38 websites availableInstallation:Usage:GitHub: An0nUD4Y/blackeye
ShellPhish
ShellPhish
Description: Phishing tool for 18 social media platformsInstallation:Usage:GitHub: An0nUD4Y/shellphish
Thanos
Thanos
Maskphish
Maskphish
Description: Hide phishing URLs under normal-looking URLs (google.com or facebook.com)Installation:Usage:GitHub: jaykali/maskphish
BlackPhish
BlackPhish
Description: Advanced phishing tool with update and management featuresInstallation:Usage:Update:GitHub: iinc0gnit0/BlackPhish
dnstwist
dnstwist
Description: Domain name permutation engine for detecting typo squatting, phishing, and corporate espionageInstallation:Usage:GitHub: elceef/dnstwist
Best Practices
Security Testing Guidelines:
- Authorization: Always obtain written permission before conducting phishing tests
- Scope: Clearly define the scope of testing with all stakeholders
- Communication: Establish clear communication channels for incident reporting
- Data Handling: Properly secure and dispose of any collected credentials
- Documentation: Document all activities for audit trails
- Debriefing: Provide educational debriefing sessions after tests
Legal Considerations
Use Cases
Security Awareness Training
Simulate real-world phishing attacks to train employees on recognizing and reporting suspicious emails.Red Team Assessments
Test an organization’s detection and response capabilities against sophisticated phishing attacks.Email Security Testing
Evaluate the effectiveness of email filtering, anti-phishing tools, and security controls.Incident Response Drills
Practice incident response procedures in controlled phishing scenarios.See Also
- Web Attack Tools - For testing web applications
- Post-Exploitation Tools - For post-compromise activities
- Social Engineering Techniques - Learn more about social engineering
- Spear-phishing attack vectors
- Website attack vectors
- Infectious media generator
- Mass mailer attack
- Credential harvester
GitHub: trustedsec/social-engineer-toolkit