Skip to content

LyticOnaope/zphisher-Report

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 

Repository files navigation

🎣 Simulated Phishing Attack Using Zphisher (Ethical Lab)

This project documents a phishing simulation carried out in a controlled environment using Kali Linux and Zphisher. The goal was to understand how phishing attacks work, how credentials are captured, and how browser security reacts.

πŸ”§ Tools Used

  • Kali Linux (VirtualBox)
  • Zphisher (GitHub Toolkit)
  • Cloudflare Tunneling

🎯 Highlights

  • Simulated LinkedIn and Facebook phishing pages.
  • LinkedIn was blocked by the browser.
  • Facebook page loaded and captured dummy credentials.
  • Only Cloudflare-generated link worked.

πŸ“„ Report

A full PDF report is included with step-by-step execution, screenshots, issues faced, and ethical considerations.

🧠 Purpose

For cybersecurity learning and ethical hacking awareness. No real targets were involved.


Author: Onaopemipo Olugbemiro
πŸ”—Linkedin πŸ“§Email

About

A simulated phishing attack using Zphisher in a controlled Kali Linux lab environment. This project demonstrates how attackers use fake login pages and tunneling to capture credentials. Conducted ethically for educational purposes. Includes steps, results, and key takeaways.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors