CYBERPULSE AI RedOps: Phishing Simulation with Redirect Tracking
Last edited 58 days ago
Description:
Simulate cloaked phishing links that redirect through a controlled proxy. This module tracks if secure email gateways (SEGs) or sandboxes trigger the redirect before users do. Logs access, response, and timestamps in Google Sheets.
Who’s It For:
Red Teams simulating real-world phishing redirects
Security teams testing gateway/sandbox behavior
Awareness teams tracking click-throughs
How It Works:
Loads target list from Google Sheets
Generates dynamic redirect links per target
Emails the links using Gmail or SMTP
Simulates access via webhook or internal call
Logs metadata and redirect access to Sheets
Requirements:
Google Sheet Requirements
- Sheet Name:
Redirect_Logs - Required Columns: name, team, email, module, status, payload, response, timestamp
Google Sheets credentials
Email service (Gmail, SMTP, or custom node)
Optional: Real endpoint for link redirection (e.g., Vercel Function, Cloudflare Worker)
Setup Instructions
- Clone or copy the provided Google Sheet template (linked below).
- Set up the webhook trigger in the Redirect Proxy node.
- Use URL shortener node (optional) to obfuscate redirect links.
- Connect Google Sheets node and map fields: timestamp, IP, user-agent, original URL.
- Configure redirection logic using IF and Set nodes.
- Run a test redirect to validate Google Sheet logging.
File Templates:
RedOps_RedirectCloak_Log_Template.xlsx
email name team payload response status module timestamp
[email protected] John Doe IT redirect.link/... Redirect triggered Simulated RedirectCloak 2025-07-27T12:00:00Z
Customization
- Redirect Logic: Modify the
HTTP ResponseorSetnode to redirect to real servers or simulation targets. - Tracking Format: Adjust the structure of the logged data — include fields like user-agent, referrer, campaign ID, etc.
- Redirection Endpoint: Host the redirection logic on a public API gateway (e.g., AWS API Gateway, Vercel Edge Function) if deploying outside of n8n.
- Obfuscation: Integrate a URL shortener (like Bitly) or a custom domain to hide the true destination during simulations.
Ethics Note:
This module is intended for internal simulations only and does not contain malicious payloads. Always use with authorization and red team awareness protocols.
🔗 Part of the CYBERPULSE AI RedOps Suite
🌐 https://cyberpulsesolutions.com
📧 [email protected]
You may also like
New to n8n?
Need help building new n8n workflows? Process automation for you or your company will save you time and money, and it's completely free!





