Skip to content

A security-focused platform for email that demonstrates advanced spoofing techniques while analyzing domain authentication protocols such as SPF and DMARC. Designed for defensive testing and security research, it helps users understand vulnerabilities and improve email security.

License

Notifications You must be signed in to change notification settings

xtofuub/mailsploit

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

20 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

favicon

πŸ›‘οΈ Email Spoofing Security Project

Python License Educational Use Status
Visitors

A modern security-focused web application designed to test whether a website or domain is vulnerable to email spoofing.
This tool demonstrates advanced spoofing techniques strictly for educational and research purposes.

It provides a user-friendly web interface on top of the original command-line email spoofing utility, making it easier to:

  • Perform spoofing tests in a controlled environment
  • Analyze results and identify potential risks
  • Understand vulnerabilities and how to mitigate them

By simulating spoofing attempts safely, this project helps raise awareness about email security and encourages implementing proper defenses such as SPF, DKIM, and DMARC.


⚠️ Disclaimer

Warning

For educational and security purpose only!
The developers are not responsible for any misuse of this application. Email spoofing can be illegal and should only be used for authorized testing, learning, or security research.


🌐 User Interface

{7A2FCB82-A039-4435-9B42-601C9F861E75}

The tool includes a built-in scanning feature that analyzes a domain or website to quickly identify if it is vulnerable to spoofing.
After scanning, it provides clear results and actionable recommendations to help users improve email security.

πŸš€ Features

  • Modern Web Interface: Clean, responsive design using Bootstrap 5
  • Email Spoofing: Send emails with spoofed sender information
  • Email Header Analysis: Deep analysis of email headers with security scoring
  • SMTP Testing: Test individual SMTP server connections
  • Batch Server Testing: Test multiple SMTP servers from a file
  • File Attachments: Supports various file types
  • Custom Headers: Add custom email headers
  • X-Headers Spoofing: Add fake X-headers to improve spoof legitimacy
  • Real-time Validation: Form validation with visual feedback
  • Auto-save: Automatically saves form data to localStorage
  • Responsive Design: Works on desktop and mobile devices

πŸ“‹ Requirements

  • Python 3.7+
  • Flask 2.3.3
  • SMTP server credentials

πŸ› οΈ Installation

Caution

Recommendation: For best results, run this application on Linux or Google Cloud Shell.
Running on Windows may block SMTP connections due to OS-level restrictions or firewall rules.

  1. Clone the repository
git clone https://github.com/xtofuub/mailsploit.git
cd mailsploit
  1. Install dependencies
pip install -r requirements.txt
  1. Run the application
python app.py
  1. Access the web interface Open your browser and navigate to http://localhost:5000

πŸ“ Project Structure

email-spoofing-web/
β”œβ”€β”€ app.py                 # Main Flask application
β”œβ”€β”€ requirements.txt       # Python dependencies
β”œβ”€β”€ README.md              # This file
β”œβ”€β”€ templates/             # HTML templates
β”‚   β”œβ”€β”€ base.html          # Base template
β”‚   └── index.html         # Main page template
β”œβ”€β”€ static/                # Static files
β”‚   β”œβ”€β”€ css/
β”‚   β”‚   └── style.css      # Custom CSS styles
β”‚   └── js/
β”‚       └── script.js      # JavaScript functionality
└── uploads/               # Temporary file uploads (auto-created)

🎯 Usage

Send Email Tab

  • Configure SMTP settings
  • Set spoofed sender information
  • Add TO, CC, BCC recipients
  • Write email subject and body
  • Add attachments or custom headers
  • Enable X-Headers spoofing

Test Connection Tab

  • Test single SMTP server connections
  • Verify credentials before sending emails

Test Servers Tab

  • Upload multiple SMTP servers (host|port|username|password)
  • Test all servers and view working connections

πŸ“ SMTP Server File Format

smtp.gmail.com|587|[email protected]|your-password
smtp.outlook.com|587|[email protected]|your-password
smtp.yahoo.com|587|[email protected]|your-password

πŸ”§ Configuration

Environment Variables

  • FLASK_ENV: development for debug mode
  • SECRET_KEY: Change for production

Security Notes

  • Change SECRET_KEY in app.py for production
  • Runs on all interfaces (0.0.0.0) by default
  • File uploads limited to 16MB; only allowed file types

🎨 Customization

  • Styling: Modify static/css/style.css or use Bootstrap variables
  • Functionality: Extend app.py, script.js, or HTML templates

πŸ› Troubleshooting

  • Port in use: Change port in app.py (app.run(port=5001))
  • File upload errors: Check size/type and ensure uploads/ exists
  • SMTP connection issues: Verify credentials, 2FA, and server access
  • Template not found: Ensure templates/ directory exists

Enable debug mode:

app.run(debug=True)

πŸ“š Educational Use Cases

  • Security research & learning about spoofing techniques
  • Penetration testing of email security measures
  • Raising awareness about email protocol vulnerabilities

🀝 Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes & test thoroughly
  4. Submit a pull request

πŸ“„ License

Educational purposes only. Use responsibly and legally.


πŸ”— Original Tool

Based on the command-line email spoofing tool developed by Triotion.


Remember: Use responsibly and only for legitimate educational purposes!

About

A security-focused platform for email that demonstrates advanced spoofing techniques while analyzing domain authentication protocols such as SPF and DMARC. Designed for defensive testing and security research, it helps users understand vulnerabilities and improve email security.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 44.4%
  • JavaScript 29.0%
  • HTML 18.0%
  • CSS 8.6%