- Joined
- 16 May 2024
- Messages
- 5
- Reaction score
- 2
- Points
- 3
Hey folks, red page flags or deceptive site ahead flags has really been a big problem for spammers, so I took the contract upon myself to dive deeper into why this happens. I came up with a solution which can make your page last more than a month and I decided to share with you, not joking mate, if not a jerk, you will be the only person with a scampage or phishing page that last even a year.
Whiles I can't share you my codes or scripts, these tips can make your life easier mate. I tried alot of antibot strategy, trying to defend against bots and malware scanners but the solution was simply privacy. Make your page, backend or stealer private and hard to read. These are the tips, Tip No. 4 is the Master;
1. Encoding: It's common these days but most are doing it wrong or just lazy. Malware scanners built inside email clients or providers are careful not to ruin their customer's experience on their platform so they stick to decoding one encoding method. THE SOLUTION: Use 3 encoding and obfuscation methods to hide your backend link in the frontend. With that it will require more actions and work to decode it and any attempt will cost their service to be slow. There are more than 10 encoding and obfuscation methods such as Base64 (standard, URL-safe, MIME, etc.), Base32 / Base16 (hex), Base85 / Ascii85 / Z85, UUEncoding etc. The more harder you make your stealer file unreadable on the page (frontend), the longest your scampage will last.
2. Use Reasonable Stealer name: Stealer name, I mean the file name you use at the action of your scampage or phishing page form. I know this is subtle but very important. Don't use obvious names like stealer.php, sendtogmail.php, sendtotelegram.php etc don't be an asshole, try to be smart, use real name and logical name for your pages or file names. Using obvious phishing names raise suspicions.
3. Encrypt the data your victims enters and decrypt it later. Normal websites don't collect sensitive data in plain text, when you do that, you are just telling mailware scanners, browsers and bots that, hey this page is a phishing page or scampage. They will just kill the link or the page. You can use AEAD or Envelope (hybrid) encryption method. Be smart bruv
4. Add Password to your stealer or backend and give the password to your frontend to unlock. With this the frontend is the only one who has access to the stealer or the backend. If malware scanners can't access your stealer file, your page can't be flagged.
5. Use Good VPS to host your page (Contact me if needs one). Some VPS providers are asshole. Tip: Don't buy VPS servers from website hosting providers. They fvckly scans your VPS server every single day.
Feel Free to get in touch for all your FUD Scampage or Phishing Pages, Private Scripts, mailers, SMTPs, RDPs etc.
I got alot of Hacking, Spamming, Cracking Tools including Tuts, methods and Courses, get in touch below;
OUR CHANNELS
Youtube Channel: https://www.youtube.com/@Digidarkofficial
Telegram: https://t.me/digidarkfamily
Discord: https://discord.gg/6CsPArHU
SEND A DM
Telegram: Digidark (https://t.me/digidarksupport)
Whiles I can't share you my codes or scripts, these tips can make your life easier mate. I tried alot of antibot strategy, trying to defend against bots and malware scanners but the solution was simply privacy. Make your page, backend or stealer private and hard to read. These are the tips, Tip No. 4 is the Master;
1. Encoding: It's common these days but most are doing it wrong or just lazy. Malware scanners built inside email clients or providers are careful not to ruin their customer's experience on their platform so they stick to decoding one encoding method. THE SOLUTION: Use 3 encoding and obfuscation methods to hide your backend link in the frontend. With that it will require more actions and work to decode it and any attempt will cost their service to be slow. There are more than 10 encoding and obfuscation methods such as Base64 (standard, URL-safe, MIME, etc.), Base32 / Base16 (hex), Base85 / Ascii85 / Z85, UUEncoding etc. The more harder you make your stealer file unreadable on the page (frontend), the longest your scampage will last.
2. Use Reasonable Stealer name: Stealer name, I mean the file name you use at the action of your scampage or phishing page form. I know this is subtle but very important. Don't use obvious names like stealer.php, sendtogmail.php, sendtotelegram.php etc don't be an asshole, try to be smart, use real name and logical name for your pages or file names. Using obvious phishing names raise suspicions.
3. Encrypt the data your victims enters and decrypt it later. Normal websites don't collect sensitive data in plain text, when you do that, you are just telling mailware scanners, browsers and bots that, hey this page is a phishing page or scampage. They will just kill the link or the page. You can use AEAD or Envelope (hybrid) encryption method. Be smart bruv
4. Add Password to your stealer or backend and give the password to your frontend to unlock. With this the frontend is the only one who has access to the stealer or the backend. If malware scanners can't access your stealer file, your page can't be flagged.
5. Use Good VPS to host your page (Contact me if needs one). Some VPS providers are asshole. Tip: Don't buy VPS servers from website hosting providers. They fvckly scans your VPS server every single day.
Feel Free to get in touch for all your FUD Scampage or Phishing Pages, Private Scripts, mailers, SMTPs, RDPs etc.
I got alot of Hacking, Spamming, Cracking Tools including Tuts, methods and Courses, get in touch below;
OUR CHANNELS
Youtube Channel: https://www.youtube.com/@Digidarkofficial
Telegram: https://t.me/digidarkfamily
Discord: https://discord.gg/6CsPArHU
SEND A DM
Telegram: Digidark (https://t.me/digidarksupport)