Skip to content
Related Articles

Related Articles

Improve Article

HiddenEye – Modern Phishing Tool With Advanced Functionality

  • Last Updated : 23 Sep, 2021
Geek Week

A phishing attack is the most executed attack in the real world. Phishing is a social-engineering attack in which a victim is being tricked and the sensitive data is being captured by the attacker. A genuine website is being cloned and assumed that the cloned website is genuine. There are various techniques to make a phishing page. HiddenEye is an automated tool that is the best in the category of Phishing. HiddenEye tool is developed in the Python Language, available on the GitHub platform, it’s free and open-source to use. HiddenEye tool supports Facebook, Instagram, Twitter, etc social platforms.

Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Installation of HiddenEye Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone https://github.com/DarkSecDevelopers/HiddenEye-Legacy.git



Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd HiddenEye-Legacy/

Step 3: You are in the directory of the Brutespray. Now you have to install a dependency of the Brutespray using the following command.

sudo pip3 install -r requirements.txt

Step 4: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.

python3 HiddenEye.py  -h

Working with HiddenEye Tool on Kali Linux OS

Example: Creating Facebook Phishing Page

In this example, we will be creating a Facebook Phishing page. We have selected Option 1 for Facebook.



In the below screenshot, we have selected the standard page which will be the homepage of Facebook.com

In the below screenshot, we will be creating a fake cloud flare redirection page.

We have entered the custom redirect URL.

In the below screenshot, we have specified the port number on which the URL will be hosted.

We have selected the Sever on which the Phishing page will be hosted.



We will be vising the highlighted link, which is the Phishing page for Facebook.

In the below screenshot, we have created a phishing page, now if any victim enters the credentials, we will get the credentials on the terminal itself.

We have got the credentials on the terminal itself.

My Personal Notes arrow_drop_up
Recommended Articles
Page :