Replies: 1 comment
-
just wait for the victim when the victim opens the link and input his info after that you will get access to him\her private information |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
No offense, but i am getting confuse.
when phishing link is masked and deployed. Someone might use it so where do we get the info person exposed on the link!
Beta Was this translation helpful? Give feedback.
All reactions