···11+MIT License
22+33+Copyright (c) 2025 Hatix Ntsoa
44+55+Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
66+77+The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
88+99+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+103
README.md
···11+# 🕵️♂️ InstaPhish - For Educational Purposes Only
22+33+44+55+> ⚠️ **Disclaimer**
66+>
77+> This project is intended **strictly for educational and ethical hacking awareness purposes only.**
88+>
99+> - Do **not** use this project for malicious purposes.
1010+> - The author **does not condone** illegal activity and is **not responsible** for any misuse.
1111+> - Always conduct security testing **only in authorized environments** with **explicit permission**.
1212+> - This repository is meant to help individuals and professionals understand phishing mechanics and learn how to defend against them.
1313+1414+1515+1616+<br>
1717+1818+## 📸 Preview
1919+2020+2121+
2222+2323+2424+2525+2626+<br>
2727+2828+## 🚀 Features
2929+3030+- Fake Instagram login page styled like the real interface
3131+- Logs username and password attempts
3232+- Automatically generates public forwarding using **ngrok**
3333+- Logs output in real-time to console
3434+- Dynamic PHP server running on a random available 4-digit port
3535+3636+3737+3838+<br>
3939+4040+## ⚙️ Installation & Setup
4141+4242+4343+```bash
4444+# 1. Clone this repository
4545+git clone https://github.com/hatixntsoa/instaphish.git
4646+4747+# 2. Change to the project directory
4848+cd instaphish
4949+5050+# 3. Give execution permission to the script
5151+chmod +x instaphish.sh
5252+5353+# 4. Run the phishing server
5454+./instaphish.sh
5555+````
5656+5757+5858+> ✅ Ensure you have both **PHP** and **ngrok** installed on your system.
5959+6060+6161+6262+<br>
6363+6464+## 📁 Project Structure
6565+6666+6767+```
6868+.
6969+├── app/
7070+│ └── instaphish.php
7171+├── assets/
7272+│ ├── images/
7373+│ ├── scripts/
7474+│ └── styles/
7575+├── data/
7676+│ └── credentials.txt // saved credentials
7777+├── logs/
7878+├── screenshots/
7979+├── index.html
8080+├── instaphish.sh
8181+├── LICENSE.md
8282+└── README.md
8383+```
8484+8585+8686+8787+8888+<br>
8989+9090+## 📌 Requirements
9191+9292+* **PHP** ≥ 7.x
9393+* **ngrok** with authenticated account (set up via `ngrok authtoken`)
9494+* Unix-like environment (Linux/macOS or WSL on Windows)
9595+9696+9797+<br>
9898+9999+## 📚 Legal Note
100100+101101+This repository is designed to demonstrate **how phishing works**, so that developers, companies, and users can better understand and **protect themselves** from real threats.
102102+103103+Use it **ethically** and **legally**.