Z Phisher
Z Phisher
Z Phisher
Siddhant Singhal
2021PUSCEBCYX09766
BCA (Cyber Security)
INTRODUCTION
1. What is Z-Phisher?
2. What is Phishing?
3. Uses and Features
4. Installation
5. Alternatives
6. Conclusion
The recipient is then tricked into clicking a malicious link, which can lead to
the installation of malware, the freezing of the system as part of
a ransomware attack or the revealing of sensitive information.