This script is designed to combat phishing attacks by flooding phisher databases with false information by flooding attacker database.
Forked from the phishkiller
Using multi-threading, the script generates random email addresses and passwords from a predefined list of names. Each thread independently sends POST requests to a specified URL, submitting fictitious data to overwhelm phisher databases. This proactive approach aims to dilute and disrupt the accuracy of stolen data, offering a layer of protection to potential victims.
- Stop Phising
- Copy the The "webphishkiller.py" Or The Download It Here and click the "Download raw file" Download Here
config.json
- Make sure The "webphishkiller.py" and "config.json" has to be in the directory/folder
{
"url": "https://add-the-actual-url-phishing-link-here",
"num_threads": 25,
"max_concurrent_requests": 5,
"proxy": null,
"auth_token": "your_auth_token_here"
}
python3 webphishkiller.py
- send_posts(url, session, semaphore, proxy=None): Sends POST requests to a specified URL (url). It includes randomized email and password data in the request payload. The function handles retries and timeout with a session (session) object and uses a semaphore (semaphore) to limit concurrent requests. Optionally, it supports proxy usage (proxy parameter).
- load_config(filename='config.json'): Loads configuration settings from a JSON file (config.json) or environment variables. It retrieves settings such as url, num_threads, max_concurrent_requests, proxy, and auth_token.
- main(): Coordinates the main execution flow of the script. It initializes configurations, sets up a session with retry mechanisms, applies authentication headers if an auth_token is provided, creates threads (num_threads) to send POST requests concurrently, and manages their lifecycle.
- Threads are created to execute the send_posts() function concurrently. Each thread operates independently to send HTTP POST requests with randomized data.
- logging: The script logs successful requests (including email, password, status code, and User-Agent) and failed requests (with error messages) to a requests.log file using the logging module.
- The script depends on several third-party libraries: requests, names, fake_useragent. These are used for HTTP requests, name generation, and generating random User-Agent headers respectively.
- Users can customize the script's behavior by modifying the config.json file or adjusting environment variables to fit their specific API endpoint, concurrency requirements, proxy configurations, and authentication needs.
Overall, the script provides a framework for performing multithreaded HTTP POST requests with randomized data and robust error handling/logging, making it suitable for testing or automation tasks where concurrent API interactions are necessary.
randomized data and robust error handling/logging, making it suitable for testing or automation tasks where concurrent API interactions are necessary.
Note: This script should be used responsibly and only on systems you have explicit permission to test against.