Skip to content

Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.

License

Notifications You must be signed in to change notification settings

B0lg0r0v/Elyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

59 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Elyzer

Table of Contents

Description

Elyzer is an e-mail header analyzer capable of detecting potential spoofing attempts. It will give you general information about the e-mail, the route it took, important security headers and the phishing / spoofing results.

General Informations

  • Before using this tool, make sure the e-mail header is formated correctly. This tool will parse the header according to RFC 822.
  • This tool can ONLY utilize the spoofing / phishing function if the header contains the sender's SMTP Server IPv4 address. IPv6 addresses are currently not supported.
  • Microsoft e-mail services are using IPv6 addresses, which on top of that are proxys. Finding the source address is very difficult if not simply impossible.
  • PLEASE DO NOT RELY ONLY ON THIS TOOL. Elyzer cannot garantuee you 100% accuracy.

Installation

For Unix users:

git clone https://github.com/B0lg0r0v/Elyzer.git
cd Elyzer
pip3 install -r requirements.txt

For Windows users:

Get the compiled version from the release section. The usage is the same as for unix users.

Usage

Using Elyzer is quite intuitive. Give with the -f argument the header file.

Unix:

python3 elyzer.py -f <FILE>

Windows

.\Elyzer.exe -f <FILE>

Additionally you can give a file with the -a argument to Elyzer. It will then generate you a VirusTotal Link where you can see if the file is a potential malicious file or not.

python3 elyzer.py -f <MAIL_HEADER_FILE> -a <SUSPICIOUS_FILE>

Features

Here's a quick overview of Elyzer's features:

  • Print general e-mail informations
  • Print relay routing with timestamps
  • Print security headers and check if set correctly
  • Print interesting headers such as "Envelope-From"
  • Print MS-Exchange Headers
  • Spoofing / Phishing analyzer

Spoofing / Phishing detection feature:

Notes

Credits for the getReceivedFields & the getFields functions goes to "spcnvdr" spcnvdrr@protonmail.com, Copyright 2020.
Also, thanks to @triggerfx for the custom Logo !

Disclaimer

This tool is primarly created for me as a project to enhance my coding skills and start creating some red team / blue team tools. It is not considered to be the most efficient tool out there.