Advanced infrastructure validation, security reconnaissance, and tactical payload engineering for enterprise mail systems.
Mailsploit is a dedicated security framework designed for infrastructure auditing and email vulnerability assessment. It provides security administrators and researchers with a unified dashboard to validate domain integrity, assess risk profiles, and harden mail delivery systems against unauthorized exploitation.
By facilitating controlled security simulations and deep domain reconnaissance, Mailsploit assists organizations in identifying architectural weaknesses and enforcing global standards such as SPF, DKIM, and DMARC.
Mailsploit is divided into distinct operational modules to streamline the security audit workflow.
The primary interface for simulating email delivery.
- Sender Spoofing: Validate how mail clients render spoofed envelopes and from-addresses.
- Attachment Analysis: Test filter resilience with various file types and payloads.
- X-Header Injection: Inject custom X-headers to evaluate header-based filtering logic.
- Persistance: Configurations are automatically synchronized to local storage for session continuity.
- Domain Recon: Performs an automated security audit of any domain, specifically flagging missing or weak DMARC policies.
- Header Parse: Deconstructs raw email headers to identify delivery paths and calculate a security confidence score.
- DNSBL Verification: Checks host IPs against global blacklists to assess reputation-based filtering risk.
- SMTP Validation: Verifies server connection stability and protocol support (TLS/SSL).
- Phishing Simulation: Access pre-configured templates with OpSec guidelines for internal security training.
- Macro Generation: Audit VBA-based attachment risks with integrated builder tools.
- Look-alike Testing: Use the Homoglyph generator to identify and test against typographic squatting attacks.
mailsploit-main/
├── app.py # Core Flask application & API controller
├── requirements.txt # Unified dependency manifest
├── email_template.html # Base render for spoofed communications
├── static/ # Frontend assets
│ ├── css/style.css # Enterprise UI design system
│ └── js/script.js # Asynchronous bridge and tool logic
├── templates/ # HTML5 Jinja2 components
│ ├── base.html # Global navigation & layout
│ └── index.html # High-density tool dashboard
├── uploads/ # Secure temporary storage for audit attachments
└── smtp_servers.txt # Configuration file for batch server testing
- Runtime: Python 3.8+ (LTS recommended)
- Network: Outbound access to standard SMTP ports (25, 465, 587)
- Provision Environment
git clone https://github.com/xtofuub/mailsploit.git cd mailsploit - Setup Dependencies
pip install -r requirements.txt
- Initialize Platform
python app.py
Once initialized, the platform is accessible via your primary browser at the following endpoint:
Important
Endpoint: http://localhost:5000
- Conflict Resolution: If port
5000is occupied, updateapp.run(port=XXXX)inapp.py. - Firewall Configuration: Ensure your OS or Cloud environment permits outbound SMTP traffic. Windows environments often block these by default.
- Debug Protocol: For detailed logging, enable debug mode by setting
app.debug = True.
Caution
Use Case Policy: Mailsploit is intended exclusively for authorized security auditing and professional training. The developers emphasize that any use must strictly comply with regional and international laws regarding digital security. The end-user assumes all liability for authorized and unauthorized use.