This is a proof of concept to pollute phishing kits with fake data. An old version of this project was discussed in this blog post, I decided to use this repository to add some features.
PLEASE NOTE: At the moment, phishflood
is compatible only with the phishing kits mentioned in the blog post, and with some others which follows the same structure. This is due to a naif approach for the data generation (it's a PoC 😅).
After downloading the repository, build the project:
$ make phishflood
This will create a folder build
and an executable phishflood
. You can then run the executable with the following flags:
-dmax (int)
: maximum delay between consecutive requests, in seconds (default 3600).-dmin (int)
: minimun delay between consecutive requests, in seconds (default 10).-goroutines (int)
: number of goRoutines (default 10).-proxies (string)
: one or multiple proxies; specify the schema (http default) and port, and use ',' as a separator.-seed (int64)
: seed used for random data generation, random if not specified.-url (string)
: domain name or url, if schema is not specified, https is assumed.-ua (string)
: User Agent to be used, using Chrome on iPhone by default.
- Improve code organization
- Add custom User Agent flag
- Remove colly dependency
- Started gofakeit integration for fake data generation
- Add compatibility with known phishing kits