• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. BigHead

    Method/TUT How to create a Phishing page in minutes?

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. BigHead

    Method/TUT How to create a Phishing page in minutes?

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. NIZO

    Method/Tut Phishing Detection

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  4. EarlHickey

    Phishing Detection

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. SxxNGx

    Crypto Phishing Losses Plunge 83% in 2025, But ‘Whale Hunting’ Attacks Rise

    Big Drop in Total Phishing Losses New data from Web3 security platform Scam Sniffer shows that crypto phishing losses fell sharply in 2025, dropping about 83% year‑over‑year to roughly $84 million from nearly $494 million in 2024. The number of wallets affected also declined by about 68%, to...
  6. snake__security

    How To Create A Facebook Phishing Page/Page [Manually]

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. COMRAE911

    Configure a Mail Server for Phishing / Spamming

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  8. Dexterxhx

    Method/Tut AiTM/ MFA phishing attacks in combination with “new” Microsoft protections (2025 edition)

    Adversary-in-the-middle phishing attacks are still more common in use, in the last year and the start of 2025 there is still a more visible increase in AiTM/ MFA phishing. Since the removal of basic authentication from Exchange Online more and more attackers are using more modern attacks like...
  9. Legend@

    Practical Phishing Course

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. HighProfile

    CC How To Make A Phishing Website

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. Hvx740

    Localisation (x/y) 📍

    Ce sujet concerne votre sécurité sur Internet. Il nous est parfois arrivé de rencontrer des personnes capables de nous menacer derrière leur écran. Mais heureusement : Il existe une solution pour les trouver. (Sans que la personne visée s'en aperçoive, vous venez de recevoir sa position...
  12. G

    LocHawk - Your Ultimate Location Phishing Tool

    Link: LocHawk LocHawk is a powerful location phishing tool designed to capture the IP address and geolocation details of users who click on a URL generated by the tool, sending the information back to your machine. This tool is perfect for ethical hackers, penetration testers, or anyone...
  13. hack0_bin

    WhatsappSess phishing to gain access to whatsapp

    Windows First install python then run First install python then run # Usar PowerShell como Administrador python -m venv venv venv\Scripts\activate pip install -r requirements.txt Linux # Instalar pacotes do sistema primeiro sudo apt update sudo apt install python3-pip python3-venv...
  14. nobita1122

    Social Engineering & Phishing Mastery using AI and GoPhish

    Welcome to the “Social Engineering & Phishing Mastery with AI and GoPhish” course. Learn AI-powered Phishing with GoPhish. Create Realistic Attacks, Exploit Psychology & Build Modern Cyber Defense Skills Social engineering is basically the tactic of manipulating, influencing, or deceiving a...
  15. nicaicai

    Scam Page alibaba credit card phishing page

    下载: [回复] https://mega.nz/file/H5ZlHYiY#4ZEcq2CGgazCV8nfAvpLsSez7JHVkV8-hh8sb52_Z2I [/回复]
  16. jinxwoo13

    Method/TUT How To Hide Phishing Links Latest Method

    How To Hide Phishing Links Latest Method *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. jinxwoo13

    Scam Page Trust Wallet Phishing Full Page + Seed Capture

    Trust Wallet Phishing Full Page + Seed Capture Trust Wallet Phrase Phishing Features : Mnemonic Validator Supports both 12-word and 24-word mnemonics Result Example *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. nicaicai

    Scam Page KFC credit card phishing page

    下载: [回复] https://mega.nz/file/X5BynDLb#nywYMtKB66TK_vGJhU3G_t3K2oYbuCRmOMRIrW9GIlg [/回复]
  19. Nofset

    Method/TUT AI-Deepfake Voice Phishing: Spamming the Elderly with Personalized "Grandchild" Scams for Instant CVV Dumps

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. Legend@

    How to Perform Phishing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit...
  21. darkhub23

    Method/TUT Avoid Red Page (Deceptive Site Ahead) with these tips

    Hey folks, red page flags or deceptive site ahead flags has really been a big problem for spammers, so I took the contract upon myself to dive deeper into why this happens. I came up with a solution which can make your page last more than a month and I decided to share with you, not joking mate...
  22. Legend@

    Configure a Mail Server for Phishing / Spamming

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  23. darkhub23

    Method/TUT [Guide] How to Clone a Website Using Just Your Browser

    Hey folks, The first stage of creating a phishing page or scampage is to clone the targeted page, let say you want to phish or spam webmails, you just have to find a real webmail login page or website and clone it, then after you add your antibots like rate limiting, fail2ban etc and your...
  24. darkhub23

    Method/TUT Top 5 Best Website Cloning Tools

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. Legend@

    how to earn money from Phishing Campaign Profits:

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  26. EarlHickey

    Phishing app for attacks targeting Microsoft Azure and Office365 users

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  27. Matrix-432

    MATRIXPDF: ADVANCED PDF PHISHING | JAVASCRIPT ACTIONS + GMAIL BYPASS

    Advanced PDF Phishing, Payload Deployment & JavaScript Actions Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Video [Screenshots] - Telegram: @Matrix432 - TOX...
  28. sglcv2

    From Phish to Domain Admin to OneDrive Exfil [2025 Red Team Handbook]

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. catsuko

    Scam Page ROBLOX BEAMING GENERATOR (hack users with a phishing link)

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. catsuko

    Login:Pass ROBLOX BEAMING GENERATOR (hack users with a phishing link) gennlu

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  31. Fullface1312

    Logs Others Details for spear phishing attacks 2

    Reach out if you have specific requests, I can provide more premium cases with corporate details. *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
  32. Fullface1312

    Logs Others Details for spear phishing attacks

    Reach out for more tailored details, I can provide corporate related details etc. *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. USD

    How To Hide Phishing Links ✔️

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  34. PHAMAME

    Private MIX The Self-Sufficient Carder: Understanding the Art of Phishing ?

    The Self-Sufficient Carder: Understanding the Art of Phishing ? For more enquiries CONTACTS ………. ………. ………. ………. ………. ………. [ Telegram: @PHAMAME ] [ Signal: +1 6154840580 ] [ Official Mail: phamame8@gmail.com ] ………. ………. ………. ………. ………. ………. ? The Self-Sufficient Carder: Understanding the Art of...
  35. PHAMAME

    Method/Tut Source Code The Self-Sufficient Carder: Understanding the Art of Phishing ?

    The Self-Sufficient Carder: Understanding the Art of Phishing ? For more enquiries CONTACTS ………. ………. ………. ………. ………. ………. [ Telegram: @PHAMAME ] [ Signal: +1 6154840580 ] [ Official Mail: phamame8@gmail.com ] ………. ………. ………. ………. ………. ………. ? The Self-Sufficient Carder: Understanding the Art of...
  36. whoyu

    Login:Pass How to Recognize Phishing Emails

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. L

    rblxflip phishing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. maxmycookies

    Evilginx2 YAML Phishing Toolkit

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  39. EarlHickey

    A beginners friendly, Automated Phishing Tool with 30+ Templates

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  40. FrankFinancial

    Scam Page Vodafone UK - Live Phishing Page & Admin Panel

    If you need any help setting it up, message me on Telegram: https://t.me/FrankFinancial Download
  41. echo

    Scam Page 🔥❤️‍ Phishing Live Panel ❤️‍ Get CVV+OTP+BANKS+Authenticator 🎁Craxpro Member Free 7day code🎁

    ❤️‍ Committed to customer experience and satisfaction, you will experience the best service Мы стремимся к высокому качеству обслуживания и удовлетворенности клиентов, поэтому вы получите наилучшее обслуживание.
  42. mrscandy

    Best phishing tools

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. Alta37

    Multi/Others AutoPhisher the best phishing tool used cloudflared to generte FUD link

    Download: https://github.com/CodingRanjith/autophisher/tree/main *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** Thank you this will help you phish
  44. Kanshah12

    Combo Tools TOP 10 PHISHING TOOLS
    5.00 star(s) 1 Rating

    ☠️🐈‍⬛ TOP 10 PHISHING TOOLS TO USE IN 2025 🔗 Setoolkit - https://github.com/trustedsec/social-engineer-toolkit 🔗 SocialFish - https://github.com/UndeadSec/SocialFish 🔗 HiddenEye - https://github.com/DarkSecDevelopers/HiddenEye-Legacy 🔗 Evilginx2 - https://github.com/kgretzky/evilginx2 🔗...
  45. P!3T

    Scam Page SumUp Uadmin Phishing panel 2025 version. Multilanguage

    DOWNLOAD LINK: https://anonymfile.com/2pbeW/sumupeu-incompleet.zip If you questions just send me a message on craxpro.to!
  46. xmanxxx

    Phishing Methodology

    Methodology Recon the victim Select the victim domain. Perform some basic web enumeration searching for login portals used by the victim and decide which one you will impersonate. Use some OSINT to find emails. Prepare the environment Buy the domain you are going to use for the phishing...
  47. ashimuzirimumwanyi

    CC Understanding Credit Card Phishing: A Comprehensive Overview

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. EarlHickey

    Free Phishing Tools

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. china01507

    8M DATABASE OF PHISHING SITES✨CHECK IF A LINK GOES TO A PHISHING PAGE

    On this site there is a 8M phishing sites database. There is also a function to search for active phishing sites and also check if a link is a phishing link. *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** kindly leave likes
  50. farketmezberk

    ❗ Phishing Tool Links ❗

    ⭕️ Modern phishing tool hidden eye 🔗 Link :https://github.com/DarkSecDevelopers/HiddenEye ⭕️ complete phishing tool 32 templates + 1 customizable 🔗 Link :https://github.com/thelinuxchoice/blackeye ⭕️ social media phishing with shellphish 🔗 Link : https://github.com/thelinuxchoice/shellphish...
Top Bottom