01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
01110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 0110101101110000 01101000 01101001 01110011 01101000 01101001 01101110 01100111 00100000 01100110 01110010 01100001 01101101 01100101 01110111 01101111 01110010 01101011
$ ./launch_phogo.sh --stealth
Phogo Logo

Phogo

The ultimate phishing framework for professional security testing - cast your nets with precision and stealth.

Where  digital bait meets  tactical precision

The Flagship of Phishing Frameworks

Phogo is not just another phishing tool—it's a comprehensive maritime arsenal for security professionals. Like a well-equipped pirate vessel, Phogo provides everything needed to test an organization's defenses against the most sophisticated social engineering attacks lurking in digital waters.

The Captain's Arsenal

DNS Management

Chart your course with complete domain control. Phogo's integrated DNS management lets you navigate the seas of domain configuration with ease.

NameServer Services

Establish your own fleet of nameservers to maintain complete control over your campaign's digital territory.

Multi-Provider Email Delivery

Deploy your messages through 6+ different provider types or standard SMTP, ensuring your communications reach their targets.

Distributed VPN Infrastructure

Like a fleet of ships communicating across vast oceans, Phogo's distributed system of Controllers and Phoglings operates securely over VPN connections using gRPC over QUIC (HTTP/3) for lightning-fast, encrypted communication, creating a coordinated armada for your operations.

Template Builder

Craft convincing lures with our browser-based reverse proxy template builder—design the perfect bait for your target.

Payload Generation

Forge powerful payloads that slip past defenses like a phantom ship in the night, ready to execute when triggered.

"A rowboat might get you to shore — Phogo storms it. This is phishing, KrakenTech style."

— KrakenTech Security Team

Advanced Features for the Seasoned Navigator

  • Landing Page Acquisition

    Capture and clone any website with our advanced scraping technology. Like a master cartographer, Phogo maps every detail of the target site for perfect replication.

  • Campaign Management

    Navigate multiple campaigns simultaneously with our intuitive dashboard. Track your fleet of phishing expeditions from a single command center.

  • Credential Harvesting

    Securely collect and store captured credentials in encrypted form, ensuring that your treasure is protected while maintaining ethical boundaries.

  • Multi-Stage Campaigns

    Deploy sophisticated multi-stage attacks that adapt based on user interaction, like a kraken with many tentacles reaching from different directions.

  • Session Hijacking via VPN Exit Nodes

    Phogo's distributed VPN network serves as exit nodes, allowing operators to assume victim sessions and interact with target applications under the victim's context—all while maintaining operational security.

  • Phogling Node Network

    Deploy a fleet of lightweight Phogling nodes that can serve as nameservers, forward proxies, or reverse proxies. These versatile nodes communicate with the Controller via gRPC over QUIC (HTTP/3), creating a distributed network that's both resilient, lightning-fast, and adaptable to mission requirements.

The Kraken's Advantage

What sets Phogo apart from other frameworks is its comprehensive integration of all aspects of phishing operations. While other tools focus on individual components, Phogo brings together the entire arsenal under one flag, providing seamless coordination between all elements of your security testing campaign.

Written entirely in Go for maximum performance and reliability, Phogo's advanced session hijacking capabilities leverage its distributed VPN infrastructure to allow operators to sail through the digital seas under the identity of compromised targets. The system's nodes communicate via gRPC over QUIC (HTTP/3) for unparalleled speed and reliability, enabling security teams to demonstrate the full impact of successful phishing campaigns by navigating internal systems with the same access level as the victim.

Technical Specifications

Distributed System Requirements

Primary Server ("Controller")

  • Linux-based operating system
  • 4GB RAM minimum (8GB recommended)
  • Static IP address recommended
  • Supports high-throughput gRPC communication

Secondary Servers ("Phoglings")

  • Linux-based operating system
  • 1GB RAM minimum
  • Can function as nameservers, forward proxies, or reverse proxies
  • Minimum of one Phogling required for full functionality

Security Features

  • End-to-end encryption for all communications
  • Secure credential storage with AES-256
  • IP rotation capabilities
  • Anti-detection mechanisms

Supported Email Providers

  • Standard SMTP
  • Amazon SES
  • SendGrid
  • Mailgun
  • Office 365
  • Gmail API
  • Custom SMTP providers

The Captain's Log

[2023-09-15] Successfully deployed against Fortune 500 company. 87% email delivery rate, 34% click-through.

[2023-10-22] New template engine released. Landing page replication accuracy increased to 99.7%.

[2023-12-05] Added support for Microsoft OAuth phishing simulation with MFA bypass testing.

[2024-01-30] Enhanced session hijacking capabilities via VPN exit nodes. Operators can now seamlessly assume victim context.

[2024-02-18] Distributed infrastructure improved to use gRPC over QUIC on the VPN network to improve stealth and latency.

$ ./phogo_stats.sh --last-quarter

Campaigns launched: 142

Emails delivered: 98.3%

Average click rate: 32.7%

Credential capture: 17.4%

_

Ready to Set Sail with Phogo?

Contact our crew to discuss how Phogo can enhance your organization's security awareness and testing capabilities.

LEGAL DISCLAIMER: Phogo is designed for legitimate security testing only. Use of this tool requires proper authorization from the target organization. KrakenTech does not condone or support illegal or unauthorized use of this framework. Users are responsible for complying with all applicable laws and regulations.

$ ./contact_us.sh

Ready to Unleash the Kraken?

Contact us to discuss your offensive security needs and how our tools and expertise can enhance your security posture.