{
	"id": "e8d91f23-6533-4dff-852f-cd6bbca774e5",
	"created_at": "2026-04-06T02:11:26.129547Z",
	"updated_at": "2026-04-10T13:11:24.995898Z",
	"deleted_at": null,
	"sha1_hash": "213a9cbe55057f6f81c0c0e09626c9e93a7b05a1",
	"title": "GitHub - spyboy-productions/Facad1ng: Open-source URL masking \u0026 analysis tool for security research, phishing awareness, and defensive testing. Demonstrates adversary techniques used to disguise malicious links.",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 893372,
	"plain_text": "GitHub - spyboy-productions/Facad1ng: Open-source URL\r\nmasking \u0026 analysis tool for security research, phishing awareness,\r\nand defensive testing. Demonstrates adversary techniques used to\r\ndisguise malicious links.\r\nBy thisisshubhamkumar\r\nArchived: 2026-04-06 01:51:25 UTC\r\nIf you find this GitHub repo useful, please consider giving it a star! ⭐️\r\nddoowwnnllooaaddss 6 9 k\r\nFacad1ng is an open-source URL masking and analysis tool designed for security research, phishing awareness,\r\nand defensive testing.\r\nIt demonstrates how adversaries may disguise malicious links using URL manipulation and social engineering\r\ntechniques, helping defenders understand and mitigate such attacks.\r\n🧭 MITRE ATT\u0026CK Mapping\r\nMMIITTRREE AATTTT\u0026\u0026CCKK T1665\r\n RReeffeerreenncceedd bbyy TTiiddaall CCyybbeerr\r\nMapped to MITRE ATT\u0026CK® T1665 – Hide Infrastructure (Command and Control).\r\nThis project is publicly referenced by Tidal Cyber (Community Edition) as part of adversary behavior research.\r\n🔗 https://app.tidalcyber.com/references/bd80f3d7-e653-5f8f-ba8a-00b8780ae935\r\nImportant\r\nEducational \u0026 Defensive Use Only\r\nFacad1ng is a proof-of-concept project intended for security research, phishing awareness training, and\r\nauthorized penetration testing. It demonstrates techniques used by real-world attackers so defenders can better\r\nhttps://github.com/spyboy-productions/Facad1ng\r\nPage 1 of 5\n\nrecognize, detect, and prevent them.\r\nUnauthorized or malicious use is strictly discouraged.\r\nRun Online Free On Google Colab\r\nOOppeenn iinn CCoollaabb\r\nExample:\r\nYour phishing link: https://example.com/whatever\r\nGive any custom URL: gmail.com\r\nPhishing keyword: anything-u-want\r\nOutput: https://gamil.com-anything-u-want@tinyurl.com/yourlink\r\n# Get 4 masked URLs like this from different URL-shortener\r\n⭔ Key Features:\r\nURL Masking: Facad1ng allows users to mask URLs with a custom domain and optional phishing\r\nkeywords, making it difficult to identify the actual link.\r\nMultiple URL Shorteners: The tool supports multiple URL shorteners, providing flexibility in choosing\r\nthe one that best suits your needs. Currently, it supports popular services like TinyURL, osdb, dagd, and\r\nclckru.\r\nInput Validation: Facad1ng includes robust input validation to ensure that URLs, custom domains, and\r\nphishing keywords meet the required criteria, preventing errors and enhancing security.\r\nUser-Friendly Interface: Its simple and intuitive interface makes it accessible to both novice and\r\nexperienced users, eliminating the need for complex command-line inputs.\r\nOpen Source: Being an open-source project, Facad1ng is transparent and community-driven. Users can\r\ncontribute to its development and suggest improvements.\r\nRequirements:\r\nP Y T H O N\r\n G I T\r\n⭔ Git Installation\r\nhttps://github.com/spyboy-productions/Facad1ng\r\nPage 2 of 5\n\ngit clone https://github.com/spyboy-productions/Facad1ng.git\r\ncd Facad1ng\r\npip3 install -r requirements.txt\r\npython3 facad1ng.py\r\n⭔ PYPI Installation : https://pypi.org/project/Facad1ng/\r\npip install Facad1ng\r\nHow To Run On CLI:\r\nFacad1ng \u003cyour-phishing-link\u003e \u003cany-custom-domain\u003e \u003cany-phishing-keyword\u003e\r\nExample: Facad1ng https://ngrok.com gmail.com accout-login\r\nPython code:\r\nimport subprocess\r\n# Define the command to run your Facad1ng script with arguments\r\ncommand = [\"python3\", \"-m\", \"Facad1ng.main\", \"https://ngrok.com\", \"facebook.com\", \"login\"]\r\n# Run the command\r\nprocess = subprocess.Popen(command, stdout=subprocess.PIPE, stderr=subprocess.PIPE)\r\n# Wait for the process to complete and get the output\r\nstdout, stderr = process.communicate()\r\n# Print the output and error (if any)\r\nprint(\"Output:\")\r\nprint(stdout.decode())\r\nprint(\"Error:\")\r\nprint(stderr.decode())\r\n# Check the return code to see if the process was successful\r\nif process.returncode == 0:\r\nhttps://github.com/spyboy-productions/Facad1ng\r\nPage 3 of 5\n\nprint(\"Facad1ng completed successfully.\")\r\nelse:\r\n print(\"Facad1ng encountered an error.\")\r\nContribution:\r\nContributions and feature requests are welcome! If you encounter any issues or have ideas for improvement, feel\r\nfree to open an issue or submit a pull request.\r\n😴🥱😪💤 ToDo:\r\nFix trycloudflare error which is blocked by TinyURL\r\nTinyURL not shorting trycloudflare Solution: don’t use pyshortner. shorten links manually one by one if TinyURL\r\nblocks try using different shortener\r\n💬 If having an issue Chat here\r\n⭔ Snapshots:\r\nhttps://github.com/spyboy-productions/Facad1ng\r\nPage 4 of 5\n\nIf you find this GitHub repo useful, please consider giving it a star! ⭐️\r\nSource: https://github.com/spyboy-productions/Facad1ng\r\nhttps://github.com/spyboy-productions/Facad1ng\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://github.com/spyboy-productions/Facad1ng"
	],
	"report_names": [
		"Facad1ng"
	],
	"threat_actors": [],
	"ts_created_at": 1775441486,
	"ts_updated_at": 1775826684,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/213a9cbe55057f6f81c0c0e09626c9e93a7b05a1.pdf",
		"text": "https://archive.orkl.eu/213a9cbe55057f6f81c0c0e09626c9e93a7b05a1.txt",
		"img": "https://archive.orkl.eu/213a9cbe55057f6f81c0c0e09626c9e93a7b05a1.jpg"
	}
}