https://github.com/spyboy-productions/facad1ng
The Ultimate URL Masking Tool - An open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using social engineering techniques.
https://github.com/spyboy-productions/facad1ng
hide-phishing-link link-shortener mask-phishing-url masking-phishing phishing social-engineering social-engineering-attacks url-mask url-masker url-masking url-phishing url-shortener
Last synced: 5 months ago
JSON representation
The Ultimate URL Masking Tool - An open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using social engineering techniques.
- Host: GitHub
- URL: https://github.com/spyboy-productions/facad1ng
- Owner: spyboy-productions
- License: mit
- Created: 2023-09-07T16:12:51.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2025-02-19T23:41:16.000Z (8 months ago)
- Last Synced: 2025-04-20T16:38:19.675Z (6 months ago)
- Topics: hide-phishing-link, link-shortener, mask-phishing-url, masking-phishing, phishing, social-engineering, social-engineering-attacks, url-mask, url-masker, url-masking, url-phishing, url-shortener
- Language: Python
- Homepage: https://colab.research.google.com/github/spyboy-productions/Facad1ng/blob/main/Facad1ng.ipynb
- Size: 1.12 MB
- Stars: 298
- Watchers: 5
- Forks: 35
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
If you find this GitHub repo useful, please consider giving it a star! ⭐️
![]()
Facad1ng is an open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using social engineering techniques.
> [!IMPORTANT]
> This tool is a Proof of Concept and is for Educational Purposes Only.> [!CAUTION]
> **Please use this responsibly and ethically.**
>DISCLAIMER
> It is possible to use Facad1ng for nefarious purposes. It merely illustrates what adept attackers are capable of. Defenders have a responsibility to consider such attacks and protect their users from them. Using Facad1ng should only be done with the written permission of the targeted parties for legitimate penetration testing assignments.### Run Online Free On Google Colab
[](https://colab.research.google.com/github/spyboy-productions/Facad1ng/blob/main/Facad1ng.ipynb)
### Example:
```
Your phishing link: https://example.com/whateverGive any custom URL: gmail.com
Phishing keyword: anything-u-want
Output: https://gamil.com-anything-u-want@tinyurl.com/yourlink
# Get 4 masked URLs like this from different URL-shortener
```
---
### ⭔ Key Features:
- **URL Masking**: Facad1ng allows users to mask URLs with a custom domain and optional phishing keywords, making it difficult to identify the actual link.
- **Multiple URL Shorteners**: The tool supports multiple URL shorteners, providing flexibility in choosing the one that best suits your needs. Currently, it supports popular services like TinyURL, osdb, dagd, and clckru.
- **Input Validation**: Facad1ng includes robust input validation to ensure that URLs, custom domains, and phishing keywords meet the required criteria, preventing errors and enhancing security.
- **User-Friendly Interface**: Its simple and intuitive interface makes it accessible to both novice and experienced users, eliminating the need for complex command-line inputs.
- **Open Source**: Being an open-source project, Facad1ng is transparent and community-driven. Users can contribute to its development and suggest improvements.
---
OS compatibility :
![]()
![]()
![]()
![]()
Requirements:
![]()
![]()
### ⭔ Git Installation
---```
git clone https://github.com/spyboy-productions/Facad1ng.git
```
```
cd Facad1ng
```
```
pip3 install -r requirements.txt
```
```
python3 facad1ng.py
```### ⭔ PYPI Installation : https://pypi.org/project/Facad1ng/
---
```
pip install Facad1ng
```#### How To Run On CLI:
```
Facad1ng
```
```
Example: Facad1ng https://ngrok.com gmail.com accout-login
```
### Python code:
```py
import subprocess# Define the command to run your Facad1ng script with arguments
command = ["python3", "-m", "Facad1ng.main", "https://ngrok.com", "facebook.com", "login"]# Run the command
process = subprocess.Popen(command, stdout=subprocess.PIPE, stderr=subprocess.PIPE)# Wait for the process to complete and get the output
stdout, stderr = process.communicate()# Print the output and error (if any)
print("Output:")
print(stdout.decode())
print("Error:")
print(stderr.decode())# Check the return code to see if the process was successful
if process.returncode == 0:
print("Facad1ng completed successfully.")
else:
print("Facad1ng encountered an error.")
```---
## Contribution:
Contributions and feature requests are welcome! If you encounter any issues or have ideas for improvement, feel free to open an issue or submit a pull request.
#### 😴🥱😪💤 ToDo:
- Fix trycloudflare error which is blocked by TinyURL
TinyURL not shorting trycloudflare
Solution: don’t use pyshortner. shorten links manually one by one if TinyURL blocks try using different shortener#### 💬 If having an issue [Chat here](https://discord.gg/ZChEmMwE8d)
[](https://discord.gg/ZChEmMwE8d)### ⭔ Snapshots:
---
If you find this GitHub repo useful, please consider giving it a star! ⭐️