> COMMAND_CENTER
// RECENT_TARGETS
NO_ACTIVE_TARGETS
// SYS_STATUS
READY> GLOBAL_TARGETS
Live geographic footprint · infiltration feed · conversion metrics
// INFECTION_METRICS
Funnel performance> PLATFORM_CONTROL
// DOCKER_STATUS
// DEPLOY_PHISHING_FRAMEWORK
// ACTIVE_CONTAINERS 0
| CONTAINER_ID | NAME | STATUS | CREATED | ACTIONS | |
|---|---|---|---|---|---|
| NO_ACTIVE_CONTAINERS | |||||
> ACTIVE_TARGETS
| SESSION_ID | LOCATION | DEVICE | IP_ADDRESS | ACTIVITY | ACTIONS |
|---|---|---|---|---|---|
| NO_ACTIVE_TARGETS | |||||
> HARVESTED_DATA
| SESSION_ID | TIMESTAMP | COOKIES | KEYLOGS | CREDENTIALS | FILES | ACTIONS | |
|---|---|---|---|---|---|---|---|
| NO_DATA_HARVESTED | |||||||
> AGENT_FILTER
Substring match (case-insensitive). Prefix with regex: for RegExp (max 300 chars). Whitelist ON = only matching browsers reach protected APIs.
// UA_SIMULATOR
LIVE_RULES// QUICK_PRESETS → BLACKLIST
Adds common patterns (duplicates skipped).
// IMPORT_EXPORT
// BLACKLISTED_AGENTS
0- NO_BLACKLISTED_AGENTS
// WHITELISTED_AGENTS
0If enabled with at least one pattern, only matching User-Agents pass (after whitelist check, built-in + custom blacklist still apply unless builtin disabled).
- NO_WHITELISTED_AGENTS
> EMAIL_SENDER
// SMTP_CONFIG
// SMTP_ROTATION_POOL
0 SERVERSAdd multiple SMTP servers. Emails rotate through them (round-robin or random). Each server can have its own From address. If pool is empty, primary SMTP above is used.
// COMPOSE_EMAIL
SPOOF & ENVELOPE
// RECIPIENTS
0 TARGETS| NAME | STATUS | ACTIONS | ||
|---|---|---|---|---|
| NO_RECIPIENTS_ADDED | ||||
// CAMPAIGN_CONTROL
// CAMPAIGN_TRACKING
Open + click tracking per campaign. Emails auto-include a 1px pixel (open) and rewrite links (click redirect). Toggle in SMTP settings.
| CAMPAIGN | SENT | OPENED | CLICKED | FAILED | ACTIONS |
|---|---|---|---|---|---|
| NO_CAMPAIGNS_TRACKED | |||||
TIMELINE
// TARGET_GROUPS
0Save contact lists for reuse. Import CSV (columns: email, name, firstName, lastName).
// CAMPAIGN_LOGS
NO_CAMPAIGN_LOGS
> FAKE_UPDATE_PAGES
// GENERATE_PHISHING_LINK
29 TEMPLATESLoading templates...
http://localhost:10004 (dedicated Fake Update port). Do not use the phishing port (:10002).
// CAMPAIGN_TRACKING
0 CAMPAIGNS| CAMPAIGN_ID | TEMPLATE | PAGE_VIEWS | CLICKS | DOWNLOADS | LAST_ACTIVITY | ACTIONS |
|---|---|---|---|---|---|---|
| NO_CAMPAIGNS_YET | ||||||
// AVAILABLE_TEMPLATES
29 TEMPLATES🖥️ Desktop & Software
🎮 Gaming & Apps
💰 Crypto & Finance
📱 Social Media
> FIND_ME
// GENERATE_TRACKING_LINK
Generate a tracking link via Cloudflare tunnel (automatic). When someone opens it, their IP location + GPS (if allowed) are captured and shown on a satellite map.
// TRACKING_LINKS
0| LABEL | HITS | CREATED | ACTIONS |
|---|---|---|---|
| NO_LINKS_YET | |||
> 0 _EXPLOIT
Simulated attack vectors. No real payloads are sent — UI visualization only.
// TARGET
// ATTACK_VECTOR
// ATTACK_CHAIN
IDLE// KNOWLEDGE_BASE
0-click: Attack requiring zero victim interaction. The device/app auto-processes attacker data (message preview, image decode, notification render) and a bug in that code leads to code execution.
Real-world examples: NSO Pegasus (iMessage), BLASTPASS (iOS), Predator (Android), FORCEDENTRY (ImageIO). Prices: $1M–$20M on exploit markets.
Defense: Keep OS + apps updated, enable Lockdown Mode (iOS), disable link previews, use hardware security keys, assume compromise if you're a high-value target.
> REMOTE
// QR
—
> SYS_CONFIG
// SHIELD & DDOS
—Login, static assets and public endpoints are never blocked. Below applies to protected routes (authenticated API / panel internals).
DOCKER / PLATFORM
PANEL_HTTP_LAYERS (toggle per layer)
Limit concurrent connections per IP on protected routes.
Per-IP rate window (ready when limits are tightened in code).
Same rules as AGENT_FILTER (blacklist / whitelist / built-in).
Block probes for .env, wp-admin, swagger, etc.; may temp-block IP.
ANTI-PHISHING_DETECTION (phishing link shields — port 10002)
These protect your phishing link from scanners, anti-phishing bots, sandboxes. Applied in nginx + Go server + admin panel.
Block 80+ known security scanners, anti-phishing services (PhishTank, SafeBrowsing, URLScan, VirusTotal, Netcraft…), email security gateways (Proofpoint, Barracuda, Mimecast…), social link previews (Facebook, WhatsApp, Telegram, Discord…).
Block requests whose Referer comes from analysis sandboxes (VirusTotal, URLScan.io, Any.Run, Hybrid Analysis, Joe Sandbox…).
Block requests with no User-Agent header (real browsers always send one).
Block short non-browser UAs and prefetch/preview requests from email clients and link scanners.
ADVANCED_SHIELDS (deep inspection)
Block requests with Purpose: prefetch, suspicious Sec-Fetch combos, or missing Accept-Language from browser-like UAs.
Only allow visitors from specific countries. Most scanners are from US/IE/DE/NL. Enter 2-letter codes below.
Block IPs from datacenters (AWS, Azure, GCP, DigitalOcean…), VPNs (NordVPN, Mullvad…), and Tor exit nodes. Analysts almost always use these.
Limit unique IPs per phishing link. After N different visitors, the link dies (404). Prevents re-scanning by VirusTotal etc.
Serve an intermediate page that requires JavaScript execution. Bots (curl, wget, scanners) fail automatically; real browsers pass in <1s.
SESSION
// TARGET_CONFIG
localhost, the phone cannot reach it — set your PC LAN IP + port (e.g. http://192.168.0.10:10000), save, then generate QR.
// 📱 TELEGRAM_ALERTS
Step 1: Open Telegram, search for @BotFather, send /newbot
Step 2: Follow instructions, get the Bot Token (looks like 123456:ABC-DEF...)
Step 3: Open your new bot in Telegram, press START
Step 4: To get your Chat ID, search for @userinfobot, send /start — it replies with your ID
Step 5: Paste both below and click SAVE
When enabled, you receive alerts for new sessions, credentials captured, etc.