Home Hacking Tools Phishing 101 using SocialFish Tool

Phishing 101 using SocialFish Tool

by Unallocated Author

Phishing is a classic favorite attack of hackers. Not only that it provides easy access to victims’ accounts by merely tricking them to key in their credentials, the setup is also pretty easy to do.

This article will feature one of the tools that we found on GitHub – SocialFish.

It has always been a critical case to IT security practitioners to inform users of the danger of phishing. In an enterprise setup, IT security personnel need to raise awareness to all employees on how to spot a phishing attempt be it on their mailboxes or on websites that they visit particularly social media.

SocialFish shows how easy it is for cybercriminals to create dummy pages that mask themselves as legitimate websites. For some, it could be easy to identify the telltale signs of a fake website but what if they’re creative enough to lure you to enter your account information without you realizing that you are already taking their bait?

Such is the case in one of SocialFish’s phishing simulation wherein you can create a seemingly innocent page like a survey or poll site to gather whatever information that may be insignificant to you at first. But later on, as soon as you have already established that trust from your victims, you can have them sign up by using their social media accounts.

SocialFish has templates for the top seven social media sites namely Facebook, Google, LinkedIn, Twitter, Stackoverflow, Wordpress and even GitHub. This tool can help you generate the traditional signup or login pages for these social networks. But, what I want to focus on was the feature called ‘advanced login’. Cybercriminals can be so creative to use this technique for more sophisticated attacks.

For the purpose of this article, we have tested SocialFish in a Kali Linux environment. It works perfectly well as soon as it generated the fake template of a poll. Once you’re done filling out the form, you will then be asked to connect your answers to your Facebook account. This is the dangerous part. The culprits are just waiting for this part on the backend. As soon as you’ve finished handing them over your credentials, they now have the liberty to do whatever they want on your account.

To avoid using the tool for malicious activities, SocialFish included a portion of the script that before running the tool, users must accept it is for educational purposes.

You may also watch the tutorial video below of the tool:

What Bunny rating does it get?

We have decided to give this tool a good bunny rating of 3/5 bunnies
If you would like to learn more about ethical hacking and such techniques, we have an exclusive course with a 90% discount HERE
Get in touch with us via the contact form if you would like us to look at any other GitHub ethical hacking tools.

You may also like

Latest Hacking News

Privacy Preference Center


The __cfduid cookie is used to identify individual clients behind a shared IP address and apply security settings on a per-client basis.

cookie_notice_accepted and gdpr[allowed_cookies] are used to identify the choices made from the user regarding cookie consent.

For example, if a visitor is in a coffee shop where there may be several infected machines, but the specific visitor's machine is trusted (for example, because they completed a challenge within your Challenge Passage period), the cookie allows Cloudflare to identify that client and not challenge them again. It does not correspond to any user ID in your web application, and does not store any personally identifiable information.

__cfduid, cookie_notice_accepted, gdpr[allowed_cookies]


DoubleClick by Google refers to the DoubleClick Digital Marketing platform which is a separate division within Google. This is Google’s most advanced advertising tools set, which includes five interconnected platform components.

DoubleClick Campaign Manager: the ad-serving platform, called an Ad Server, that delivers ads to your customers and measures all online advertising, even across screens and channels.

DoubleClick Bid Manager – the programmatic bidding platform for bidding on high-quality ad inventory from more than 47 ad marketplaces including Google Display Network.

DoubleClick Ad Exchange: the world’s largest ad marketplace for purchasing display, video, mobile, Search and even Facebook inventory.

DoubleClick Search: is more powerful than AdWords and used for purchasing search ads across Google, Yahoo, and Bing.

DoubleClick Creative Solutions: for designing, delivering and measuring rich media (video) ads, interactive and expandable ads.



The _ga is asssociated with Google Universal Analytics - which is a significant update to Google's more commonly used analytics service. This cookie is used to distinguish unique users by assigning a randomly generated number as a client identifier. It is included in each page request in a site and used to calculate visitor, session and campaign data for the sites analytics reports. By default it is set to expire after 2 years, although this is customisable by website owners.

The _gat global object is used to create and retrieve tracker objects, from which all other methods are invoked. Therefore the methods in this list should be run only off a tracker object created using the _gat global variable. All other methods should be called using the _gaq global object for asynchronous tracking.

_gid works as a user navigates between web pages, they can use the gtag.js tagging library to record information about the page the user has seen (for example, the page's URL) in Google Analytics. The gtag.js tagging library uses HTTP Cookies to "remember" the user's previous interactions with the web pages.

_ga, _gat, _gid