Ronni Skansing c4b9639679 markdown
Signed-off-by: Ronni Skansing <rskansing@gmail.com>
2025-08-31 15:57:36 +02:00
2025-08-21 17:31:49 +02:00
2025-08-21 16:14:09 +02:00
2025-08-21 16:14:09 +02:00
2025-08-21 16:14:09 +02:00
2025-08-21 16:14:09 +02:00
2025-08-22 12:05:49 +02:00
2025-08-22 12:05:49 +02:00
2025-08-21 16:14:09 +02:00
2025-08-21 16:14:09 +02:00
2025-08-26 18:19:42 +02:00
2025-08-21 16:14:09 +02:00
2025-08-21 16:14:09 +02:00
2025-08-21 16:14:09 +02:00
2025-08-26 18:19:42 +02:00
2025-08-31 15:57:36 +02:00
2025-08-22 12:05:49 +02:00

Phishing Club

Latest Release Discord License: AGPL v3

The self-hosted phishing framework for penetration testing and security awareness training.

Quick start

For systemd-enabled distributions, installation is quick and easy

Run the following on the server

curl -fsSL https://raw.githubusercontent.com/phishingclub/phishingclub/main/install.sh | bash

Remember to copy the admin URL and password

For a manual step by step guide or more in depth installation information - click here

Features

  • Multi-stage phishing flows - Pre/main/post landing pages with session tracking
  • Flexible scheduling - Time windows, business hours, or manual control
  • Multiple domains - Auto TLS, custom sites, asset management
  • Advanced delivery - SMTP configs or custom API endpoints
  • Recipient tracking - Groups, CSV import, repeat offender metrics
  • Real-time analytics - Timelines, dashboards, per-user event history
  • Automation - HMAC-signed webhooks, REST API, import/export
  • Multi-tenancy - Segregated client handling and statistics for service providers
  • Security features - MFA, SSO, session management, IP filtering
  • Operational tools - In-app updates, CLI installer, config management

Resources & Learning

Students & Learning

For cybersecurity students who want hands-on phishing simulation experience. The development setup includes a local mail server (Mailpit) so you can see emails in real-time without needing external SMTP. Spin up campaigns, test templates, and learn how phishing attacks work in a safe, contained environment.

Template Development

Phishing Template Workbench

Speed up your template development with our template workbench tool:

Phishing Template Workbench - A developer-focused environment for creating and testing phishing simulation templates.

  • Preview - Preview templates
  • Variable support - See {{.FirstName}}, {{.Email}} substitution with realistic sample data
  • Naive Responsive Testing - Preview templates across mobile, tablet, and desktop
  • Export Ready - Compatible with Phishing Club formats
  • Included Templates - Comes with example templates covering common phishing scenarios that you can import and customize

Development Setup

This repository contains the core Phishing Club platform.

Prerequisites

  • Docker and Docker Compose
  • Git
  • Make (optional, for convenience commands)

Quick Start

  1. Clone the repository:
git clone https://github.com/phishingclub/phishingclub.git
cd phishingclub
  1. Start the services:
make up
# or manually:
docker compose up -d
  1. Access the platform:
  • Administration: http://localhost:8003
  • HTTP Phishing Server: http://localhost:80
  • HTTPS Phishing Server: https://localhost:443
  1. Get admin credentials:

The username and password are output in the terminal when you start the services. If you restart the backend service before completing setup by logging in, the username and password will change.

make backend-password
  1. Setup and start phishing:

Open https://localhost:8003 and setup the admin account using the credentials from step 4.

Visit the Phishing Club Guide for more information.

Services and Ports

Port Service Description
80 HTTP Phishing Server HTTP phishing server for campaigns
443 HTTPS Phishing Server HTTPS phishing server with SSL
8002 Backend API Backend API server
8003 Frontend Development frontend with Vite
8101 Database Viewer DBGate database administration
8102 Mail Server Mailpit SMTP server for testing
8103 Container Logs Dozzle log viewer
8104 Container Stats Docker container statistics
8201 ACME Server Pebble ACME server for certificates
8202 ACME Management Pebble management interface

Development Commands

The makefile has a lot of convenience commands for development.

# Start all services
make up

# Stop all services
make down

# View logs
make logs

# Restart specific service
make backend-restart
make frontend-restart

# Access service containers
make backend-attach
make frontend-attach

# Reset backend database
make backend-db-reset

# Get backend admin password
make backend-password

Development Domains

For development we use .test for all domains. But this must also be handled on the host level. You must either modify the hosts file and add the domains you use or run a local DNS server and ensure all *.test domains resolves to 127.0.0.1.

# Add to your DNSMasq configuration
address=/.test/127.0.0.1

Option 2: Hosts File

Add to /etc/hosts:

127.0.0.1 microsoft.test
127.0.0.1 google.test
... add your development domains here

Development SSL Certificates

The development environment uses Pebble ACME server for automatic SSL certificate generation. In production, configure your preferred ACME provider or upload custom certificates.

If you experience any issues with certificate generation, bring the backend down, clear the local certs and start the backend again:

  • make backend-down
  • make backend-clear-certs
  • make backend-up

License

Phishing Club is available under a dual licensing model:

Open Source License (AGPL-3.0)

This project is licensed under the GNU Affero General Public License v3.0 (AGPL-3.0). This means:

  • You can use, modify, and distribute the software freely
  • Perfect for educational, research, and commercial use
  • You can run your own instance for security testing
  • ⚠️ Important: If you provide the software modified as a network service (SaaS), you must make your source code available under AGPL-3.0

Commercial License

For organizations that want to:

  • Use Phishing Club in commercial products without AGPL restrictions
  • Offer Phishing Club as a service without source code disclosure
  • Integrate with proprietary software
  • Get dedicated support and maintenance

Contact us for commercial licensing: license@phishing.club

Contributing

We welcome contributions from the community! Please read our Contributing Guidelines for detailed information on:

  • Development setup and workflow
  • Code standards and conventions
  • Submission requirements
  • License agreements

Quick Start for Contributors:

  1. Check existing issues and create a feature request if needed
  2. Wait for approval before starting work
  3. Fork the repository and create a feature branch
  4. Follow our development workflow and coding standards
  5. Submit a pull request with signed commits

For complete details, see CONTRIBUTING.md.

Support

Need help? Join the Phishing Club Discord

Security and Ethical Use

This platform is designed for authorized security testing only.

For important information about:

  • Reporting security vulnerabilities
  • Ethical use requirements
  • Legal responsibilities
  • Security best practices

Please read our Security Policy.

Important: Users are solely responsible for ensuring their use complies with all applicable laws and regulations.

Languages
Go 58.1%
Svelte 33.9%
JavaScript 7.3%
Shell 0.3%
CSS 0.2%
Other 0.1%