Meet your first
custom phishlet builder.
Phislet.engineer helps security teams deploy custom phishlets that capture credentials and bypass 2FA — for authorized penetration testing only.
Trusted by the teams redefining
security testing
Get started in 3 simple steps
From selection to deployment in under 24 hours.
Choose Your Phishlet
Select from our collection of pre-built phishlets or request a custom target.
Complete Payment
Pay securely via card (Paystack) or cryptocurrency. Instant confirmation.
Receive & Deploy
Get your phishlet files via email or Telegram within 24 hours with full documentation.
Explore our phishlet collection
Click any card to see a live demo of our custom-built phishlets in action.
Office 365
Microsoft login with 2FA bypass and full session capture. Supports OAuth flows.
Professional network phishlet with OAuth capture and profile data extraction.
Discord
Gaming platform phishlet with token capture and 2FA bypass capabilities.
Social media phishlet with session hijacking and 2FA interception.
GitHub
Developer platform phishlet with SSH key capture and 2FA bypass.
Outlook
Email access phishlet with full session capture and contact extraction.
Enterprise-grade phishlet solutions
Built for professional security teams who demand reliability and precision.
2FA Bypass
Advanced techniques to intercept and replay authentication tokens in real-time.
Real-Time Sessions
Capture and maintain active sessions with instant notification on successful captures.
Pixel-Perfect Clones
Undetectable login pages that mirror the original with 100% accuracy.
Auto-Updates
Phishlets automatically update when target sites change their login flows.
Dashboard Analytics
Track campaign performance with detailed analytics and reporting.
Evasion Tech
Built-in techniques to bypass common phishing detection systems.
Simple, transparent pricing
Choose the plan that fits your security testing needs.
Starter
- ✓ Single phishlet of choice
- ✓ 2FA bypass included
- ✓ 30 days support
- ✓ Setup documentation
- ✗ Custom modifications
- ✗ Priority support
Professional
- ✓ 3 phishlets of choice
- ✓ 2FA bypass included
- ✓ 90 days support
- ✓ Setup documentation
- ✓ Minor custom modifications
- ✗ Priority support
Enterprise
- ✓ 6 phishlets (full collection)
- ✓ 2FA bypass included
- ✓ 1 year support
- ✓ Full documentation
- ✓ Full custom modifications
- ✓ Priority 24/7 support
Accepted Payment Methods
What our clients say
"Incredible quality. The Office365 phishlet bypassed 2FA flawlessly during our red team engagement. Saved us weeks of development time."
"Fast delivery, excellent documentation, and the support team helped us customize for our specific client environment. Highly recommend."
"The enterprise pack is worth every penny. All 6 phishlets worked out of the box. Our security awareness training has never been more effective."
Frequently asked questions
A phishlet is a configuration file used with Evilginx or similar tools for authorized penetration testing. It creates a reverse proxy that can capture credentials and session tokens, including those protected by 2FA.
Our phishlets are sold exclusively for authorized security testing and educational purposes. You must have written permission from the target organization before using these tools. Unauthorized use is illegal and strictly prohibited.
Each purchase includes detailed documentation on setting up Evilginx, configuring your phishlet, and managing campaigns. We also provide video tutorials and optional setup assistance.
Due to the digital nature of our products, we do not offer refunds once the phishlet files have been delivered. However, we guarantee all phishlets work as described and provide full support.
We accept Stripe (credit/debit cards), Paystack (for African payments), and cryptocurrency (Bitcoin, Ethereum, USDT). All transactions are secure and encrypted.
Ready to get started?
Fill out the form below and we'll get back to you within 24 hours.
Legal Disclaimer
All phishlets and tools provided by Phislet Engineer are intended exclusively for authorized security testing, penetration testing, and educational purposes. By purchasing our products, you agree that:
- You have obtained written authorization from the target organization
- You will only use these tools in compliance with all applicable laws
- You understand that unauthorized use is illegal and punishable by law
- Phislet Engineer bears no responsibility for misuse of these tools
Unauthorized access to computer systems is a federal crime. Violators may face criminal prosecution, fines, and imprisonment.