Update README.md

This commit is contained in:
Muhammad Talha Khan 2020-04-04 22:57:57 +05:00 committed by GitHub
parent 5b6661a1e6
commit 747c801d14
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 2 additions and 3 deletions

View File

@ -1,13 +1,12 @@
# Windows Phisher # Windows Phisher
### Description:
# Windows_Phisher.ino:<br> ## Windows_Phisher.ino:<br>
Windows credential phisher, Works by running powershell script and pausing for 1 minute before asking for username and password. Popup only Windows credential phisher, Works by running powershell script and pausing for 1 minute before asking for username and password. Popup only
goes away after valid credentials are given if so credentials are sent to webhook.site from where they can be later retrieved from remote goes away after valid credentials are given if so credentials are sent to webhook.site from where they can be later retrieved from remote
location. Orignal concept stolen from [Nishang](https://github.com/samratashok/nishang/blob/master/Gather/Invoke-CredentialsPhish.ps1)<br> location. Orignal concept stolen from [Nishang](https://github.com/samratashok/nishang/blob/master/Gather/Invoke-CredentialsPhish.ps1)<br>
### Zeymare_Windows_Phisher.ino:<br> ## Zeymare_Windows_Phisher.ino:<br>
Windows credential phisher, works same as Windows_Phisher.ino but logs all entered credentials inculding the invalid ones. It stores them in temporary directory on file rake and in the end delete the created file after sending them when correct credentials are entered. Windows credential phisher, works same as Windows_Phisher.ino but logs all entered credentials inculding the invalid ones. It stores them in temporary directory on file rake and in the end delete the created file after sending them when correct credentials are entered.
**Instructions:**<br> **Instructions:**<br>