Operator Access

Enter operator password

Default: xmr2026

What the xmrwallet operator saw

Open Wallet Investigation PhishDestroy PoC
Test Sessions
Select or create a test session above
Victim Profile
No session
Captured Credentials
No session
Operator Controls
Phase 1: Set fake balance (victim thinks funds are there)
GA Measurement ID
GA Trigger Mode — how xmrwallet hid from scanners
"Click" = GA loads only after user interaction (default, like real xmrwallet). URLScan shows clean page.
"Always" = GA loads on page load. URLScan shows google-analytics.com requests.
Make two scans with different modes → proof they controlled when GA appeared.
GA Exfiltration — google-analytics.com/collect
No GA events
Request Timeline — PHP Endpoints
No requests