Skip to content

Cyphisher provides simulated phishing scenarios and awareness resources to help security teams train staff, validate controls, and run controlled exercises. Strictly for educational use and authorized testing only — do not deploy against systems or users without explicit written consent.

License

Notifications You must be signed in to change notification settings

Largo-m/cyphisher

🔥 Cyphisher - Advanced Multi-Platform Phishing Framework

Cyphisher Banner Professional Cybersecurity Education Tool

Python Version Platform License GitHub Stars GitHub Forks

The Ultimate Cross-Platform Phishing Awareness & Education Framework

Trusted by cybersecurity professionals worldwide

📖 Table of Contents

🌟 Features

✨ Core Capabilities

  • 🎭 29+ Realistic Phishing Templates - Industry-leading social engineering simulations
  • 🌐 Auto Cloudflare Tunneling - Instant public URLs with zero configuration
  • 📱 True Multi-Platform Support - Runs everywhere: Windows, Linux, macOS, Android, iOS
  • 🎨 Rich Terminal Interface - Beautiful, responsive console interface with advanced UI
  • 🤖 AI-Powered Content Generator - Create convincing phishing scenarios automatically
  • 📊 Real-time Data Collection - Organized, secure credential storage system

🔄 Cross-Platform Excellence

  • Automatic Dependency Management - One-click setup for all platforms
  • Smart Cloudflared Detection - Auto-downloads platform-specific binaries
  • Virtual Environment Isolation - Clean, conflict-free Python environment
  • Background Service Management - Professional daemon-like operation
  • Self-Healing Setup - Automatic error recovery and dependency resolution

🚀 Quick Start

⚡ One-Command Installation & Launch

# Clone and run (works on all platforms)
git clone https://github.com/AUX-441/cyphisher.git
cd cyphisher
chmod +x setup.sh
./setup.sh

That's it! The intelligent setup script automatically detects your platform and handles everything.

🎯 What Happens Automatically

  • ✅ Platform detection and optimization
  • ✅ Python environment setup
  • ✅ Dependency installation
  • ✅ Cloudflared tunnel configuration
  • ✅ Professional interface launch

🛠️ Installation

Prerequisites

  • Python 3.7+ (automatically installed if missing)
  • Git (for cloning the repository)
  • Internet connection (for initial setup)

Step-by-Step Setup

1. Clone the Repository

git clone https://github.com/AUX-441/cyphisher.git
cd cyphisher
python main.py

2. Run the Intelligent Setup Script

# Make executable and run
chmod +x setup.sh
./setup.sh

3. Watch the Magic Happen! ✨

The advanced script automatically:

  • ✅ Detects your OS and architecture with precision
  • ✅ Installs Python and system packages intelligently
  • ✅ Creates optimized virtual environment
  • ✅ Downloads platform-specific cloudflared binary
  • ✅ Installs all Python dependencies seamlessly
  • ✅ Launches the professional cybersecurity interface

📱 Multi-Platform Support

🪟 Windows (10/11)

# Command Prompt or PowerShell
git clone https://github.com/AUX-441/cyphisher.git
cd cyphisher
python main.py

🐧 Linux (Ubuntu/Debian/Kali/Arch)

# Automatic distribution detection
git clone https://github.com/AUX-441/cyphisher.git
cd cyphisher
chmod +x setup.sh
./setup.sh

 macOS (Intel/Apple Silicon)

# Universal binary support
git clone https://github.com/AUX-441/cyphisher.git
cd cyphisher
chmod +x setup.sh
./setup.sh

📱 Android (Termux)

pkg update && pkg install git python
git clone https://github.com/AUX-441/cyphisher.git
cd cyphisher
chmod +x setup.sh
./setup.sh

📱 iOS (iSH Shell)

apk update && apk add git python3
git clone https://github.com/AUX-441/cyphisher.git
cd cyphisher
chmod +x setup.sh
./setup.sh

🎯 Available Templates

Cyphisher comes with 29 professionally engineered templates organized into intuitive categories:

💼 Social Media & Communication Platforms

# Platform Realism Description
1 Instagram ⭐⭐⭐⭐⭐ Latest UI with enhanced security features
2 Facebook ⭐⭐⭐⭐⭐ Modern design with realistic interactions
3 Twitter/X ⭐⭐⭐⭐ Updated interface with verification flows
4 LinkedIn ⭐⭐⭐⭐ Professional network simulation
5 Snapchat ⭐⭐⭐⭐ Mobile-optimized experience

🎮 Gaming & Entertainment Services

# Platform Realism Description
6 Steam ⭐⭐⭐⭐⭐ Gaming platform with trade holds
7 Twitch ⭐⭐⭐⭐ Streaming service simulation
8 Roblox ⭐⭐⭐⭐ Youth gaming platform
9 Netflix ⭐⭐⭐⭐⭐ Premium streaming experience
10 Discord ⭐⭐⭐⭐ Community platform with nitro offers

💰 Financial & Business Applications

# Platform Realism Description
11 PayPal ⭐⭐⭐⭐⭐ Payment processor with 2FA
12 Google ⭐⭐⭐⭐⭐ Multi-service authentication
13 Microsoft ⭐⭐⭐⭐ Enterprise suite login
14 Adobe ⭐⭐⭐⭐ Creative cloud services
15 GitHub ⭐⭐⭐⭐ Developer platform access

🛠️ Technical & Development Platforms

# Platform Realism Description
16 GitLab ⭐⭐⭐⭐ DevOps platform simulation
17 WordPress ⭐⭐⭐⭐ CMS admin interface
18 Django Admin ⭐⭐⭐⭐ Web framework backend

🔐 Advanced Security Assessment Templates

# Template Level Use Case
26 Info Stealer Advanced Comprehensive data collection
27 Phone Number Intermediate Two-factor authentication testing
28 Location Basic Geolocation permission auditing
29 Webcam Capture Advanced Media access security testing

🔧 Advanced Usage

🎛️ Environment Configuration

Customize Cyphisher behavior with intelligent environment variables:

# Professional background mode (ideal for servers)
BACKGROUND=1 ./setup.sh

# Custom port configuration for specific needs
PORT=8080 ./setup.sh

# Manual cloudflared control
AUTO_CF=0 ./setup.sh

# Combined advanced configuration
BACKGROUND=1 PORT=3000 AUTO_CF=1 ./setup.sh

🔄 Professional Service Management

Service Initialization

# Interactive foreground mode (development)
./setup.sh

# Production background mode (servers)
BACKGROUND=1 ./setup.sh

Real-time Monitoring

# Application log monitoring
tail -f app.log

# Cloudflare tunnel diagnostics
tail -f cloudflared.log

# Data collection review
ls -la */credentials.txt

Service Control

# Graceful service termination
pkill -f "python.*main.py"
pkill -f cloudflared

# Alternative graceful shutdown
kill $(cat app.pid 2>/dev/null) $(cat cf.pid 2>/dev/null) 2>/dev/null

🏗️ Enterprise-Grade Architecture

cyphisher/
├── main.py                 # Advanced main application
├── setup.sh               # Intelligent multi-platform setup
├── requirements.txt       # Curated dependency list
├── cloud_flare/          # Platform-specific binaries
│   ├── cloudflared        # Linux/macOS optimized
│   └── cloudflared.exe    # Windows executable
├── Pages/                 # Professional template library
│   ├── steam.py          # Gaming platform simulation
│   ├── instagram.py      # Social media replication
│   └── ... (29 templates)
├── AI/                    # AI content generation engine
├── ABOUT/                 # Project documentation
├── tipme/                 # Support information
└── Automated data directories

🔒 Legal Disclaimer

⚠️ CRITICAL LEGAL NOTICE

This advanced tool is developed exclusively for authorized cybersecurity education and penetration testing.

🚫 Strictly Prohibited Activities

  • ❌ Unauthorized phishing campaigns
  • ❌ Illegal access to systems
  • ❌ Personal data exploitation
  • ❌ Fraudulent activities
  • ❌ Any malicious applications

✅ Approved Professional Use Cases

  • ✅ Corporate security awareness training
  • ✅ Authorized penetration testing engagements
  • ✅ Academic cybersecurity education
  • ✅ Security research with proper authorization
  • ✅ Red team exercises with written consent

🔐 Ethical Usage Requirements

  1. Obtain explicit written permission for all testing activities
  2. Restrict usage to owned systems or authorized environments
  3. Comply with all applicable laws and regulations
  4. Maintain ethical boundaries and respect privacy
  5. Focus on education and security improvement

The developers assume no liability for misuse. Users are solely responsible for ethical and legal compliance.

🛡️ Security Features

🔍 Advanced Evasion Techniques

  • Realistic Template Engineering - Industry-standard platform replication
  • SSL/TLS Encryption - End-to-end secure communications
  • Clean Codebase - Transparent, auditable source code
  • No Persistent Backdoors - Ethical design principles

📈 Enterprise-Grade Architecture

  • Modular Design - Easy extension and customization
  • Comprehensive Logging - Full activity transparency
  • Robust Error Handling - Professional-grade reliability
  • Cross-Platform Consistency - Uniform experience everywhere

🤝 Contributing

We welcome contributions from the global cybersecurity community!

🎯 Contribution Opportunities

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/advanced-feature)
  3. Commit your changes (git commit -m 'Add advanced security feature')
  4. Push to the branch (git push origin feature/advanced-feature)
  5. Open a Professional Pull Request

📋 Contribution Guidelines

  • ✅ Enhance template realism and security
  • ✅ Improve multi-platform compatibility
  • ✅ Add advanced security features
  • ✅ Fix issues and optimize performance
  • ✅ Expand documentation and examples

🐛 Professional Issue Reporting

Encountered an issue? Please provide:

  • Detailed platform information
  • Comprehensive reproduction steps
  • Relevant error messages and logs
  • Expected versus actual behavior

💝 Support the Project

Cyphisher is developed with passion for the cybersecurity community. If this tool helps your security education or professional work, consider supporting its development:

💰 Cryptocurrency Donations

TON Blockchain:

UQDt0vlknHD77sHysWRuEV5i79MivfEZGN_CdZH16oj1WnRJ

Ethereum/BNB Chain:

0xE8e903eE127113c30aFd52acbDbdB567968534Ea

📱 QR Codes for Easy Donations

TON Wallet Address:
TON QR Code

Ethereum/BNB Address:
ETH/BNB QR Code

TRX Address:
TRX QR Code

🌟 Other Support Methods

  • Star the repository ⭐ on GitHub
  • Share with colleagues in the security community
  • Contribute code or documentation
  • Report issues and suggest improvements

Your support helps maintain and improve Cyphisher for the entire cybersecurity community!

📜 License

This project is licensed under the MIT License - see the LICENSE file for complete details.

📄 License Summary

  • Free educational use permitted
  • Modification and redistribution allowed with attribution
  • Commercial use allowed with restrictions
  • No warranty - use at your own risk

🚀 Begin Your Cybersecurity Journey

# Start your professional security education in three commands:
git clone https://github.com/AUX-441/cyphisher.git
cd cyphisher  
./setup.sh

⭐ If Cyphisher helps your security work, please consider starring the repository!

Report IssuesRequest FeaturesView DocumentationSupport Development


🔐 Professional Reminder: Ethical usage ensures the continued development of valuable security education tools.

Thank you for using Cyphisher responsibly! 🛡️


Cyphisher - Empowering Cybersecurity Education Worldwide

About

Cyphisher provides simulated phishing scenarios and awareness resources to help security teams train staff, validate controls, and run controlled exercises. Strictly for educational use and authorized testing only — do not deploy against systems or users without explicit written consent.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

No packages published

Contributors 2

  •  
  •