Simulate cloaked phishing links that redirect through a controlled proxy. This module tracks if secure email gateways (SEGs) or sandboxes trigger the redirect before users do. Logs access, response, and timestamps in Google Sheets.
Red Teams simulating real-world phishing redirects
Security teams testing gateway/sandbox behavior
Awareness teams tracking click-throughs
Loads target list from Google Sheets
Generates dynamic redirect links per target
Emails the links using Gmail or SMTP
Simulates access via webhook or internal call
Logs metadata and redirect access to Sheets
Redirect_Logs
Google Sheets credentials
Email service (Gmail, SMTP, or custom node)
Optional: Real endpoint for link redirection (e.g., Vercel Function, Cloudflare Worker)
RedOps_RedirectCloak_Log_Template.xlsx
email name team payload response status module timestamp
[email protected] John Doe IT redirect.link/... Redirect triggered Simulated RedirectCloak 2025-07-27T12:00:00Z
HTTP Response
or Set
node to redirect to real servers or simulation targets.This module is intended for internal simulations only and does not contain malicious payloads. Always use with authorization and red team awareness protocols.
🔗 Part of the CYBERPULSE AI RedOps Suite
🌐 https://cyberpulsesolutions.com
📧 [email protected]