An intuitive and easy-to-use tool for phishing by cloning more than 60 customizable templates. The author disclaims any responsibility for the use of the tool beyond its intended purpose.
GPL-3.0 License
I would like to ask for your collaboration in this project. Adding a star to this repository would be a great help. Simply click the 'Star' button at the top right of the repository page.
Your support means a lot to me and the project in general. Thank you in advance for your help and collaboration! ⭐
To ensure ErisPhisher runs smoothly, you'll need to install the following dependencies based on your operating system:
For Termux
$ pkg install git python3 python-pip php openssh -y
For Debian (Debian, Ubuntu, Kali, Parrot)
$ sudo apt install git python3 python3-pip php openssh-client -y
For Redhat(Fedora)
$ sudo dnf install git python3 php openssh -y
For Arch (Manjaro)
$ sudo pacman -S git python3 python-pip php openssh --noconfirm
Just, Clone this repository -
$ git clone https://github.com/k4itrun/ErisPhisher.git
Now go to cloned directory and run eris.sh
-
$ cd ErisPhisher
$ bash eris.sh
Or, directly run
$ git clone https://github.com/k4itrun/ErisPhisher && cd ErisPhisher && bash eris.sh
OS | Support Level |
---|---|
Windows | Unsupported (Consider using Docker, VirtualBox, or VMware) |
iPhone | Alpha (Docker recommended) |
MacOS | Alpha (Docker recommended) |
Linux | Excellent |
Android | Excellent |
You can easily install ErisPhisher in Termux by using tur-repo
$ pkg install tur-repo
$ pkg install ErisPhisher
$ ErisPhisher
Termux strongly discourages any hacking-related discussions. Therefore, please refrain from discussing any topics related to ErisPhisher in any of the Termux discussion groups. For more information, refer to the: wiki
If any of the required packages are missing, they will be automatically installed on the first run.
This project is inspired by zphisher, The goal is to improve and simplify phishing techniques, making them more effective and easier to use.
This tool has been developed for educational purposes and serves as a demonstration of phishing techniques. If anyone wishes to attempt unauthorized access to someone's social media accounts, they do so at their own risk. Users bear full responsibility and may be held accountable for any damages or legal violations resulting from the use of this tool. The author disclaims any responsibility for any misuse of Eris.