A professional security research tool designed for testing anti-phishing measures with automatic payload generation and comprehensive logging.
- URL Input: Simple field for entering the URL where the POST request will be sent.
- Payload Input: Text field for entering raw POST request data.
- Copy from Browser: Option to copy POST payloads from browser developer tools (F12 > Network > POST > Payload).
- Automatic Variable Detection: The program automatically detects placeholders like
{access_key},{word01}, and replaces them with random values.
- Automatic Variable Detection: The system automatically finds placeholders like
{access_key=rand22}and replaces them with random values. - Random BIP39 Words: For fields requiring random phrases, the tool generates valid BIP39 words.
- Dynamic Variable Generation: Supports variables like
access_key={rand_string}orword01={bip39_word}.
- Success Logs: After a successful POST request, the log shows success details (e.g., Status Code: 200 OK).
- Error Logs: In case of a failed request, the log clearly explains the cause (e.g., "Invalid URL format", "Connection failed").
- Status Updates: Notifies the user of progress ("Preparing data", "Sending request").
- Clear Formatting: All logs are easy to understand, showing step-by-step progress, results, and error explanations.
- User-Agent Rotation: The tool randomly changes user-agent strings to avoid detection.
- Proxy Support: Integration of proxy use for request anonymization.
- Formatted Payload: Displays the processed payload with random values.
- Success/Error Messages: Displays clear success or failure messages for the request.
- Generated Values: Generated values are shown in the logs.
- Node.js 20+
- npm or yarn
- Unzip the Archive
unzip anti-phishing-tool.zip cd anti-phishing-tool- Install Dependencies
npm install- Start the Project
npm run dev- Open the Browser Navigate to:
http://localhost:5000
Enter the URL for the POST request:
https://example-phishing-site.com Paste or type the original payload:
access_key=725d9138-b81d-46c9-b2d5-37b45b12d1f8&subject=Submitted+Ledger+Live+Recovery+Phrase&redirect=https%3Aledger.com&botcheck=&word01=neck&word02=ready&word03=gift Choose which fields to generate random values for:
access_keyβ UUIDword01,word02,word03β BIP39 wordsbotcheckβ Random string
Click "Generate" to automatically replace placeholders with random values.
Click "Send" to submit the POST request.
Check the results in the log panel:
Success:
[2025-07-07 12:30:15] SUCCESS: Request sent to https://example-phishing-site.com with status 200 OK Error:
[2025-07-07 12:30:15] ERROR: Invalid URL format Progress:
[2025-07-07 12:30:10] PROCESSING: Preparing request... [2025-07-07 12:30:12] PROCESSING: Sending POST request... - Framework: React 18 with TypeScript
- Bundler: Vite for fast development
- UI: Tailwind CSS + shadcn/ui components
- State Management: TanStack Query for server-side state management
- Forms: React Hook Form with Zod validation
- Framework: Express.js with TypeScript
- WebSocket: For real-time log streaming
- Database: PostgreSQL with Drizzle ORM
- Architecture: Service-oriented architecture
- PayloadProcessor: Handles variable detection and payload generation.
- RequestSender: Manages HTTP requests with user-agent rotation and proxy support.
- VariableGenerator: Generates random values (UUID, strings, BIP39 words).
anti-phishing-tool/ βββ client/ # Frontend application β βββ src/ β β βββ components/ # React components β β βββ hooks/ # Custom hooks β β βββ lib/ # Utilities and API client β β βββ pages/ # Application pages β βββ index.html # HTML template βββ server/ # Backend application β βββ services/ # Business logic β βββ index.ts # Server entry point β βββ routes.ts # API routes β βββ storage.ts # Data storage layer βββ shared/ # Shared types and schemas β βββ schema.ts # Zod schemas and types βββ package.json # Project dependencies βββ README.md # This documentation Create a .env file in the root of the project:
DATABASE_URL=postgresql://user:password@localhost:5432/antiphishing NODE_ENV=development# Synchronize the database schema npm run db:pushhttps://httpbin.org/post- for testing HTTP requestshttps://postman-echo.com/post- alternative test service
# Basic example access_key={access_key}&word01={word01}&botcheck={botcheck} # Extended example user_id={uuid}&phrase={bip39_phrase}&token={random_string}&code={numeric} # Phishing simulation email={email}&password={password}&recovery_phrase={bip39_phrase} - Use only for testing your own systems
- Do not use real credentials
- Set up a VPN/proxy for anonymization
- Keep documentation of all tests
- All logs are saved in the interface
- Export logs to a text file
- WebSocket for real-time logs
- WebSocket may disconnect after prolonged inactivity
- Some sites block automated requests
This tool is provided "as is" exclusively for educational and research purposes in cybersecurity.
Made with β€οΈ for security researchers