mailspoof Logo

mailspoof

0
Free
Visit Website

Email spoofing is alive and well. Many organisations' SPF and DMARC records do not provide the necessary guidance for recipients to validate the authenticity of emails bearing their domain names. mailspoof can be used by organisations, pentesters and red-teamers to quickly sift through a large list of domains for lax SPF and DMARC policies. In some cases mailspoof could highlight spoofable external domains that employees are likely to trust, such as suppliers gathered from OSINT or other known organisations. Email spoofing may be successful against recipients that manage their filtering themselves. Large email providers like GMail have the big data and the heuristics to efficiently handle spam. For example, GMail will likely forward a spoofed email from a common domain directly to the spam folder, even if the email doesn't fail validation due to lax policies. Installation: $ pip3 install mailspoof Examples: CLI mailspoof outputs JSON, making it easy to query with a tool like jq. $ printf "google.com\napple.com\nmicrosoft.com" > /tmp/list $ mailspoof -d github.com -d reddit.com -iL /tmp/list

FEATURES

ALTERNATIVES

Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.

Industrial control system automation and testing tool for SCADA security testing.

An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.

A tool for extracting static and dynamic features from Android APKs.

StegSolve is a steganography analysis tool with image analysis features.

Android security virtual machine with updated tools and frameworks for reverse engineering and malware analysis.

Leveraging WebDAV features for covert communication and payload delivery.

PINNED