This application is designed to simulate phishing attacks. It includes a backend for managing phishing attempts, service to simulate attacks and a frontend for user interaction.
- Docker
- Docker Compose
-
Clone the repository:
git clone <repository-url> cd <repository-directory>
-
Build and start the services:
docker-compose up --build
-
Access the frontend at
http://localhost
. -
To stop the services, you can use:
docker-compose down