⚠️ Disclaimer: This project is intended for educational and awareness purposes only. It demonstrates how phishing techniques work to raise cybersecurity awareness. No actual user credentials were collected or misused. Always conduct ethical simulations in controlled environments with informed consent.
Extractor is a web-based simulation tool designed to showcase the mechanics behind credential phishing attacks. This includes:
⚠️ Cloning familiar login page interfaces- 🎯 Using bait content to simulate social engineering
- 📋 Logging credentials via Google Sheets API integration
Users are lured with "Python Cheat Sheets" and prompted to enter credentials on a cloned login interface. Submitted data is captured and stored in a Google Spreadsheet using custom JavaScript.
Phishing is one of the most common attack vectors in modern cybersecurity breaches. This simulation helps illustrate:
- 🧠 Social engineering principles
- 🎨 Visual trust and frontend mimicry
- 🧮 JavaScript-based data capture
- 🛡️ Importance of credential hygiene and vigilance
| Feature | Technology Used |
|---|---|
| Page Cloning | HTML & CSS |
| Data Capture Mechanism | JavaScript |
| Backend Logging | Google App Script API |
| Bait File | PDF Format (Cheat Sheet) |
| Campaign Simulation | Text Distribution Plan |
SP_Extractor/
├── index.html # Cloned login page
├── style.css # Custom UI styling
├── script.js # Google Sheets data logger
├── Python CheatSheets.pdf # Simulated bait content
├── links.txt # Mock link distribution planThis project is ideal for:
- 🧪 Cybersecurity training simulations
- 🏆 MSME hackathon demonstrations
- 🛠️ Pen-testing workshops
- 🧑💻 Digital hygiene education
Please note:
- Do not use this tool on unsuspecting individuals.
- Always obtain explicit consent before running simulations.
- This is a learning prototype—not a weapon.
MIT License. See LICENSE file for details.
Developed by Keerthi Kumar K J(https://github.com/Inteegrus-Research), who believes in blending technical exploration with ethical responsibility.