Big Drop in Total Phishing Losses
New data from Web3 security platform Scam Sniffer shows that crypto phishing losses fell sharply in 2025, dropping about 83% year‑over‑year to roughly $84 million from nearly $494 million in 2024. The number of wallets affected also declined by about 68%, to...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Adversary-in-the-middle phishing attacks are still more common in use, in the last year and the start of 2025 there is still a more visible increase in AiTM/ MFA phishing. Since the removal of basic authentication from Exchange Online more and more attackers are using more modern attacks like...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Ce sujet concerne votre sécurité sur Internet.
Il nous est parfois arrivé de rencontrer des personnes capables de nous menacer derrière leur écran.
Mais heureusement :
Il existe une solution pour les trouver. (Sans que la personne visée s'en aperçoive, vous venez de recevoir sa position...
Link:
LocHawk
LocHawk is a powerful location phishing tool designed to capture the IP address and geolocation details of users who click on a URL generated by the tool, sending the information back to your machine. This tool is perfect for ethical hackers, penetration testers, or anyone...
Windows
First install python then run
First install python then run
# Usar PowerShell como Administrador
python -m venv venv
venv\Scripts\activate
pip install -r requirements.txt
Linux
# Instalar pacotes do sistema primeiro
sudo apt update
sudo apt install python3-pip python3-venv...
Welcome to the “Social Engineering & Phishing Mastery with AI and GoPhish” course.
Learn AI-powered Phishing with GoPhish. Create Realistic Attacks, Exploit Psychology & Build Modern Cyber Defense Skills
Social engineering is basically the tactic of manipulating, influencing, or deceiving a...
Trust Wallet Phishing Full Page + Seed Capture
Trust Wallet Phrase Phishing
Features :
Mnemonic Validator
Supports both 12-word and 24-word mnemonics
Result Example
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit...
Hey folks, red page flags or deceptive site ahead flags has really been a big problem for spammers, so I took the contract upon myself to dive deeper into why this happens. I came up with a solution which can make your page last more than a month and I decided to share with you, not joking mate...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Hey folks,
The first stage of creating a phishing page or scampage is to clone the targeted page, let say you want to phish or spam webmails, you just have to find a real webmail login page or website and clone it, then after you add your antibots like rate limiting, fail2ban etc and your...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Advanced PDF Phishing, Payload Deployment & JavaScript Actions
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Video
[Screenshots]
- Telegram: @Matrix432
- TOX...
Reach out if you have specific requests, I can provide more premium cases with corporate details.
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
Reach out for more tailored details, I can provide corporate related details etc.
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
The Self-Sufficient Carder: Understanding the Art of Phishing ?
For more enquiries
CONTACTS
………. ………. ………. ………. ………. ……….
[ Telegram: @PHAMAME ]
[ Signal: +1 6154840580 ]
[ Official Mail: phamame8@gmail.com ]
………. ………. ………. ………. ………. ……….
? The Self-Sufficient Carder: Understanding the Art of...
The Self-Sufficient Carder: Understanding the Art of Phishing ?
For more enquiries
CONTACTS
………. ………. ………. ………. ………. ……….
[ Telegram: @PHAMAME ]
[ Signal: +1 6154840580 ]
[ Official Mail: phamame8@gmail.com ]
………. ………. ………. ………. ………. ……….
? The Self-Sufficient Carder: Understanding the Art of...
Download:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
❤️
Committed to customer experience and satisfaction, you will experience the best service
Мы стремимся к высокому качеству обслуживания и удовлетворенности клиентов, поэтому вы получите наилучшее обслуживание.
Download:
https://github.com/CodingRanjith/autophisher/tree/main
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Thank you this will help you phish
Methodology
Recon the victim
Select the victim domain.
Perform some basic web enumeration searching for login portals used by the victim and decide which one you will impersonate.
Use some OSINT to find emails.
Prepare the environment
Buy the domain you are going to use for the phishing...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
On this site there is a 8M phishing sites database. There is also a function to search for active phishing sites and also check if a link is a phishing link.
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
kindly leave likes
⭕️ Modern phishing tool hidden eye
🔗 Link :https://github.com/DarkSecDevelopers/HiddenEye
⭕️ complete phishing tool 32 templates + 1 customizable
🔗 Link :https://github.com/thelinuxchoice/blackeye
⭕️ social media phishing with shellphish
🔗 Link : https://github.com/thelinuxchoice/shellphish...