{% extends "base.html" %} {% block title %}Gone Fishing — AUTARCH{% endblock %} {% block content %}
Local network phishing simulator — sender spoofing, campaigns, tracking, certificate generation. Local network only.
{{name}}
{{email}}
{{company}}
{{date}}
{{link}}
{{tracking_pixel}}
Credential harvesting pages. When a target clicks a link and submits the form, credentials are captured and logged.
{{campaign_id}}
{{target_id}}
/phishmail/lp/PAGE_ID?c=CAMPAIGN_ID&t=TARGET_ID&e=EMAIL
Generate RSA keypairs for DKIM email signing. Adds the public key as a DNS TXT record automatically if the DNS service is running.
Auto-create the zone, MX, SPF, DKIM, and DMARC records for a spoofed domain using the AUTARCH DNS service.
v=spf1 a mx ip4:YOUR_IP -all
default._domainkey
v=DMARC1; p=none;
_dmarc
Techniques to bypass email content filters and keyword scanners.
Randomize email headers and generate spoofed Received chains.
Generates fake Received headers to simulate legitimate mail routing.
Generate spoofed self-signed TLS certificates for STARTTLS.