Usage of Weeman for attacking targets without prior mutual consent is illegal. Weeman developer not responsible to any damage caused by Weeman.
- Added command line options.
- Beautifulsoup dependency removed.
HTTP server for phishing in python. Usually you will want to run Weeman with DNS spoof attack. (see dsniff, ettercap).
- Create fake html page.
- Wait for clients
- Grab the data (POST).
- Try to login the client to the original page 😃
- tools/weeman_ettercap.sh - run ettercap with dns_spoof plugin.
- Python <= 2.7.
- Linux (any)
- Mac (Tested)
- Windows (Not tested)
[!] If weeman runs on your platform (Windows) (or not), please let me know.
run weeman in quiet mode:
./weeman.py -q
-
You can also run weeman from the command line (see --help).
-
For port 80 you need to run Weeman as root!
-
Host to clone (Ex: www.social-networks.local)
set url http://www.social-networks.local
- Set form action URL (Example:
<form action = "TAKE THIS URL">
)
set action_url http://www.social-networks.local/sendlogin
- The port Weeman server will listen
set port 2020
- Start the server
run
The settings will be saved for the next time you run weeman.py.
Contributions are very welcome!
- fork the repository
- clone the repo (git clone git@github.com:USERNAME/weeman.git)
- make your changes
- Add yourself in contributors.txt
- push the repository
- make a pull request
Thank you - and happy contributing!