- User Agent header parsing
- Automatic searchsploit against browser and OS
- Flash detection for IE
- JS folder contains client side extension
- Example redirect with image for internal pen testing
HTTP server for phishing in python. (and framework) Usually you will want to run Weeman with DNS spoof attack. (see dsniff, ettercap).
- Create fake html page.
- Wait for clients
- Grab the data (POST).
- Try to login the client to the original page 😃
You can use weeman with modules see examples in modules/,
just run the command framework to access the framework.
If you want to write a module please read the modules/. Soon I will write docs for the API.
You can load profiles in weeman, for example profile for mobile site and profile for desktop site.
./weeman.py -p mobile.localhost.profile
- Python <= 2.7.
- Linux (any)
- Mac (Tested)
- Windows (Not supported)
Contributions are very welcome!
- fork the repository
- clone the repo (git clone git@github.com:USERNAME/weeman.git)
- make your changes
- Add yourself in contributors.txt
- push the repository
- make a pull request
Thank you - and happy contributing!
Usage of Weeman for attacking targets without prior mutual consent is illegal. Weeman developer not responsible to any damage caused by Weeman.
