Domains Used: https://dlscorcl.info/ (D L S C O R C L)
Extra Info:
How to POST alot of junk data?
Firstly, you gotta click login, a popup will appear, then open inspect element, send a form with gibberish data, while inspecting using the networking section, click resend, it should have a Edit and Resend, click that, and you should find your Cookie Headers, and Referer.
while :; do curl -XPOST -H 'Cookie: ' -H 'Referer: ' -d 'username=WHATEVERYOUWANTTOSEND&password=WHATEVERYOUWANTTOSEND' 'https://dlscorcl.info/login/dologin'; sleep 1; done
Feel free to use remove sleep 1;, but it make just give you a timeout.
I did this to discorcl.info ( D i s c o r c l e ), and it said “License Expire” with a link to @UniSupport (UniPhish) on telegram.
I didn’t bother finding a better way to flood em, but that should work better if you have more than one terminal up.
It’s a phishing toolkit sold at several Russian forums. These pages seem to have a certain number of pulls / minute so what you are practically doing is drawing all their “phish tokens” for the period of time. It seems to work as a server anti-DDoS as well. That are my assumptions at least.