A lightweight, terminal-based Python tool to mask URLs using legit-looking domains & keywords, combined with multiple shortening services.
⚡ What is MaskGod?
MaskGod is a Python-based URL masking tool that helps you cloak URLs with custom domains and keywords—making them appear more trustworthy while still redirecting to the actual target link.
Whether you're experimenting with URL shortening, building educational phishing simulations, or just learning how link redirection works—MaskGod makes it fast, fun, and efficient.
🎯 Features
✅ Custom domain and keyword masking.
🔗 Support for multiple shorteners like TinyURL, da.gd, clck.ru, and more.
📱 Auto QR Code generation for masked links.
💾 JSON export of results.
💻 Terminal-based, lightweight, no bloat.
📦 Installation
Clone the repo and run the script:
git clone https://github.com/Nish2005karsh/URLMasking
cd URLMasking
pip install -r requirements.txt
python main.py
🧠 How It Works
You enter a target URL (e.g., https://example.com/login).
Then provide a legit-looking domain (e.g., google.com).
And a keyword (e.g., account-verify).
MaskGod shortens the URL via a service like TinyURL, then cloaks it like:
https://google.com-account-verify@tinyurl.com/abc123
Which makes it look more legitimate to the average eye.
🚀 Supported Shorteners
TinyURL
Da.gd
Clck.ru
Os.db
You can easily add more like:
Bit.ly
Adf.ly
Cutt.ly
Chilp.it
Short.cm
etc.
(Just plug them into the code with API keys if needed.)
⚠️ Disclaimer
This tool is for educational and ethical testing only.
Do not use MaskGod for phishing, scams, or malicious activities.
Always stay within legal and ethical boundaries.
🧩 Why I Built It
While working on cybersecurity tools and exploring social engineering techniques in a controlled environment, I wanted a clean and customizable URL masker that looked good and worked fast. So I built one.
📷 Screenshot
📷 Code Snippets
Customization
To add more URL shortening services:
Open the maskgod/main.py file.
Locate the shorteners list.
Add any additional URL shortening services by following the same pattern as TinyURL, Dagd, or Clck.ru. For example, here's the updated list with all the services you mentioned:
shorteners = [
("Adf.ly", pyshorteners.Shortener().adfly),
("Bit.ly", pyshorteners.Shortener().bitly),
("Chilp.it", pyshorteners.Shortener().chilpit),
("Clck.ru", pyshorteners.Shortener().clckru),
("Cutt.ly", pyshorteners.Shortener().cuttly),
("Da.gd", pyshorteners.Shortener().dagd),
("Git.io", pyshorteners.Shortener().gitio),
("Is.gd", pyshorteners.Shortener().isgd),
("NullPointer", pyshorteners.Shortener().nullpointer),
("Os.db", pyshorteners.Shortener().osdb),
("Ow.ly", pyshorteners.Shortener().owly),
("Po.st", pyshorteners.Shortener().post),
("Qps.ru", pyshorteners.Shortener().qpsru),
("Short.cm", pyshorteners.Shortener().shortcm),
("Tiny.cc", pyshorteners.Shortener().tinycc),
("TinyURL.com", pyshorteners.Shortener().tinyurl),
]
💬 Let’s Connect
If you have feature ideas, PRs, or just want to chat—connect on GitHub or drop a comment below.
⭐ GitHub Repo
👉 https://github.com/Nish2005karsh/URLMasking
🚀 Like MaskGod?
If you found MaskGod useful, interesting, or just cool —
consider giving it a ⭐ on GitHub or even 🍴 for your own version!
👉 GitHub Repo: https://github.com/Nish2005karsh/URLMasking
Every star helps spread the project and motivates me to keep building. 🙌
🔐 Want to learn how phishing works and how attackers modify URLs?
I can write a detailed educational post explaining how phishing pages are created and how URLs are disguised — strictly for ethical hacking, awareness, and defense purposes only. Let me know in the comments or give this post a like!