Usage of Weeman for attacking targets without prior mutual consent is illegal. Weeman developer not responsible to any damage caused by Weeman.
- Added new command: help
- Added "html_file" option, allows you to load html file instead of URL.
- Trying to fix bug #4, replacing files/images/scripts with full locations.
HTTP server for phishing in python.
Usually you will want to run Weeman with DNS spoof attack. (see dsniff, ettercap).
- Create fake html page.
- Wait for clients
- Grab the data (POST).
- Try to login the client to the original page 😃
- Python <= 2.7.
- Python BeautifulSoup 4
- Archlinux - sudo pacman -S python2-beautifulsoup4
- Ubuntu/Linuxmint - sudo apt-get install python-bs4
- Fedora < 22 - sudo yum install python-beautifulsoup4
- Fedora >= 22 - sudo dnf install python-beautifulsoup4
- For another OS: - sudo pip install beautifulsoup4
- Linux (any)
- Mac (Tested)
- Windows (Not tested)
[!] If weeman runs on your platform (Windows), (or not), please let me know.
Just type help
-
For port 80 you need to run Weeman as root!
-
Host to clone (Ex: www.social-networks.local)
set url http://www.social-networks.local
- "
<"form action = "TAKE THIS URL">"
(View the site source and take the URL)
set action_url http://www.social-networks.local/sendlogin
- The port Weeman server will listen
set port 2020
- Start the server
run
The settings will be saved for the next time you run weeman.py.
git clone git://github.com/Hypsurus/weeman
Copyright 2015 (C) Hypsurus hypsurus@mail.ru.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html.