SpyUs Mini Wiki Nomenclature
spuusThis page contains all suspicious, abusive, or high-risk words that may indicate
hacking attempts, fraud, automation abuse, spam, or cybercrime activity
inside your community.
If you’re not sure what a word means, check this list and compare it with the replacement version used in our censorship system.
All words are paired with masked / censored equivalents to reduce visibility while still keeping discussions readable.
Below are the categories our system uses:
- Hacking Operations – Tools, exploits, injections, payloads, MITM, privilege escalation, malware building.
- Botting & Automation Abuse – Scrapers, auto-commenters, DM bots, click farms.
- Spam & Bulk Messaging – SMTP abuse, mass email/sms, API overload.
- Fraud/Financial Abuse – Carding, logs, dumps, fullz, mule activity, OTP bypassing.
- Network/Proxy Abuse – RDP, rotating proxy, SOCKS5, UA rotation.
- Phishing & Social Engineering – Spoofing, smishing, vishing, email spoofing.
Each keyword has a hidden replacement to prevent sharing explicit harmful terminology.
Keyword
Replacement
mass dm
m@ss d*
mass email
m@ss em@!l
smtp server
sm!p s@rv*r
smtp rotation
sm!p r0t@t!on
mailing list
m@!l!ng l!st
mailing panel
m@!l!ng p@n*l
mailer
m@!l*r
sendgrid spam
s*ndgr!d sp@m
mailgun spam
m@!lg*n sp@m
php mailer
ph* m@!l*r
bulk sender
b*lk s*nd*r
sms gateway spam
sms g@t*w@y sp@m
sms api abuse
sms @p! @b*s*
telegram bot spam
t*l*gr@m b*t sp@m
whatsapp bot spam
wh@ts@pp b*t sp@m
automation script
@ut*m@t!on scr!pt
scraper bot
scr@p*r b*t
auto poster
@ut* p*st*r
auto comment bot
@ut* c*mm*nt b*t
follow bot
f*ll*w b*t
engagement bot
eng@g*m*nt b*t
traffic bot
tr@ff!c b*t
bot traffic
b*t tr@ff!c
click farm
cl!ck f@rm
ip rotation
!p r0t@t!on
device spoofing
d*v!c* sp**f!ng
ua rotation
u@ r0t@t!on
cookie rotation
c**k!e r0t@t!on
session rotation
s*ss!on r0t@t!on
fullz
f*llz
full info
f*ll !nf*
bank log
b@nk l*g
bank logs
b@nk l*gs
bank login
b@nk l*g!n
cc dump
cc d*mp
credit card dump
cr*d!t c@rd d*mp
bin list
b!n l!st
bins
b!ns
bin attack
b!n @tt@ck
carding
c@rd!ng
carder
c@rd*r
skimmer
sk!mm*r
emv
3mv
track 1
tr@ck 1
track 2
tr@ck 2
loader
l**d*r
money mule
m*n*y m*l*
drop account
dr*p @cc**nt
drop address
dr*p @ddr*ss
socks5 proxy
s*cks5 pr*xy
rotating proxy
r0t@t!ng pr*xy
rdp
rdp
vps
vps
spoof number
sp**f n*mb*r
otp bypass
0tp byp@ss
sms interception
sms !nt*rc*pt!on
sim swap
s!m sw@p
sim hijack
s!m h!j@ck
spoofed alert
sp**f*d @l*rt
bank api
b@nk @p!
session reset
s*ss!on r*s*t
fraud score
fr@*d sc*r*
fraud bot
fr@*d b*t
cashout bot
c@sh**t b*t
pin generator
p!n g*n*r@t*r
bruteforce
brut3f0rc3
brute force
brut3 f0rc3
dictionary attack
d!ct!0n@ry @tt@ck
credential stuffing
cr3d3nt!@l st*ff!ng
ddos
dd0$
dos attack
d0$ @tt@ck
botnet
b0tn3t
ssh brute
ssh br*t3
rce
rc3
remote code execution
r3m0t3 c0d3 3x3c*t!0n
rat
r@t
remote access trojan
r3m0t3 @cc3ss tr0j@n
keylogger
k3yl*gg3r
payload
p@yl04d
backdoor
b@ckd00r
malware
m@lw@r3
spyware
sp7w@r3
ransomware
r@ns0mw@r3
adware
@dw@r3
trojan
tr0j@n
worm
w0rm
virus builder
v!rus bu!ld3r
exploit
3xpl0!t
0day
0d@¥
zero day
z3r0 d@y
cve
cv3
injector
!nj3ct0r
crypter
cr¥pt3r
obfuscator
0bf*sc@t0r
bind shell
b!nd sh3ll
reverse shell
r3v3rs3 sh3ll
phishing
ph!sh!ng
spear phishing
sp3@r ph!sh!ng
smishing
sm!sh!ng
vishing
v!sh!ng
spoofing
sp00f!ng
email spoof
3m@!l sp00f
ip spoof
!p sp00f
caller id spoof
c@ll3r !d sp00f
sql injection
sql !nj3ct!0n
sqlmap
sqlm@p
xss
x$$
cross site scripting
cr0ss s!t3 scr!pt!ng
csrf
csrf*
burp suite
burp su!t3
metasploit
m3t@spl0!t
nmap
nm@p
hydra
hydr@
john the ripper
j0hn th3 r!pp3r
aircrack
@!rcr@ck
packet sniffer
p@ck3t sn!ff3r
wireshark
w!r3sh@rk
tcpdump
tcpd*mp
mac changer
m@c ch@ng3r
vpn hack
vpñ h@ck
proxy chain
pr0xy ch@!n
tor browser
t0r br0ws3r
dark web
d@rk w3b
onion link
0n!0n l!nk
hidden service
h!dd3n s3rv!c3
bot builder
b0t bu!ld3r
token grabber
t0k3n gr@bb3r
session hijack
s3ss!0n h!j@ck
cookie steal
c00k!3 st3@l
man in the middle
m@n !n th3 m!ddl3
mitm
m!tm
ssl strip
ssl str!p
dns poisoning
dns p0!$0n!ng
dns spoof
dns sp00f
credential harvest
cr3d3nt!@l h@rv3st
password dump
p@ssw0rd d*mp
hash dump
h@sh d*mp
windows exploit
w!nd0ws 3xpl0!t
kernel exploit
k3rn3l 3xpl0!t
privilege escalation
pr!v!l3g3 3sc@l@t!0n
privesc
pr!v3sc
linux privesc
l!nux pr!v3sc
rootkit
r00tk!t
dll injection
dll !nj3ct!0n
code injection
c0d3 !nj3ct!0n
command injection
c0mm@nd !nj3ct!0n
file upload bypass
f!l3 upl04d byp@ss
waf bypass
w@f byp@ss
rate limit bypass
r@t3 l!m!t byp@ss
captcha bypass
c@ptch@ byp@ss
automated bot
@ut0m@t3d b0t
selenium bot
s3l3n!um b0t
puppeteer bot
pupp3t33r b0t
smpt spam
smtp sp@m
email bomber
3m@!l b0mb3r
sms bomber
sms b0mb3r
ddos panel
dd0$ p@n3l
booter
b00t3r
stresser
str3ss3r
account checker
@cc0unt ch3ck3r
config file
c0nf!g f!l3
combo list
c0mb0 l!st
leaked database
l3@k3d d@t@b@s3
data breach
d@t@ br3@ch
breach dump
br3@ch d*mp
stealer
st3@l3r
info stealer
!nf0 st3@l3r
crypto miner
crypt0 m!n3r
clipper malware
cl!pp3r m@lw@r3