A modern security-focused web application designed to test whether a website or domain is vulnerable to email spoofing.
This tool demonstrates advanced spoofing techniques strictly for educational and research purposes.
It provides a user-friendly web interface on top of the original command-line email spoofing utility, making it easier to:
- Perform spoofing tests in a controlled environment
- Analyze results and identify potential risks
- Understand vulnerabilities and how to mitigate them
By simulating spoofing attempts safely, this project helps raise awareness about email security and encourages implementing proper defenses such as SPF, DKIM, and DMARC.
Warning
For educational and security purpose only!
The developers are not responsible for any misuse of this application. Email spoofing can be illegal and should only be used for authorized testing, learning, or security research.
The tool includes a built-in scanning feature that analyzes a domain or website to quickly identify if it is vulnerable to spoofing.
After scanning, it provides clear results and actionable recommendations to help users improve email security.
- Modern Web Interface: Clean, responsive design using Bootstrap 5
- Email Spoofing: Send emails with spoofed sender information
- Email Header Analysis: Deep analysis of email headers with security scoring
- SMTP Testing: Test individual SMTP server connections
- Batch Server Testing: Test multiple SMTP servers from a file
- File Attachments: Supports various file types
- Custom Headers: Add custom email headers
- X-Headers Spoofing: Add fake X-headers to improve spoof legitimacy
- Real-time Validation: Form validation with visual feedback
- Auto-save: Automatically saves form data to
localStorage - Responsive Design: Works on desktop and mobile devices
- Python 3.7+
- Flask 2.3.3
- SMTP server credentials
Caution
Recommendation: For best results, run this application on Linux or Google Cloud Shell.
Running on Windows may block SMTP connections due to OS-level restrictions or firewall rules.
- Clone the repository
git clone https://github.com/xtofuub/mailsploit.git
cd mailsploit- Install dependencies
pip install -r requirements.txt- Run the application
python app.py- Access the web interface
Open your browser and navigate to
http://localhost:5000
email-spoofing-web/
βββ app.py # Main Flask application
βββ requirements.txt # Python dependencies
βββ README.md # This file
βββ templates/ # HTML templates
β βββ base.html # Base template
β βββ index.html # Main page template
βββ static/ # Static files
β βββ css/
β β βββ style.css # Custom CSS styles
β βββ js/
β βββ script.js # JavaScript functionality
βββ uploads/ # Temporary file uploads (auto-created)
- Configure SMTP settings
- Set spoofed sender information
- Add TO, CC, BCC recipients
- Write email subject and body
- Add attachments or custom headers
- Enable X-Headers spoofing
- Test single SMTP server connections
- Verify credentials before sending emails
- Upload multiple SMTP servers (
host|port|username|password) - Test all servers and view working connections
smtp.gmail.com|587|[email protected]|your-password
smtp.outlook.com|587|[email protected]|your-password
smtp.yahoo.com|587|[email protected]|your-password
FLASK_ENV:developmentfor debug modeSECRET_KEY: Change for production
- Change
SECRET_KEYinapp.pyfor production - Runs on all interfaces (
0.0.0.0) by default - File uploads limited to 16MB; only allowed file types
- Styling: Modify
static/css/style.cssor use Bootstrap variables - Functionality: Extend
app.py,script.js, or HTML templates
- Port in use: Change port in
app.py(app.run(port=5001)) - File upload errors: Check size/type and ensure
uploads/exists - SMTP connection issues: Verify credentials, 2FA, and server access
- Template not found: Ensure
templates/directory exists
Enable debug mode:
app.run(debug=True)- Security research & learning about spoofing techniques
- Penetration testing of email security measures
- Raising awareness about email protocol vulnerabilities
- Fork the repository
- Create a feature branch
- Make your changes & test thoroughly
- Submit a pull request
Educational purposes only. Use responsibly and legally.
Based on the command-line email spoofing tool developed by Triotion.
Remember: Use responsibly and only for legitimate educational purposes!