Skip to content

VirusZzHkP/Email-Spoofing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

GPLv3 License

Email Spoofing

What is Email Spoofing?

Email spoofing includes sending emails with addresses that appear to be from someone else which we don’t have access in real. This is mainly done by changing the header information of the email sender to make it look like it came from a different legit sender. Email spoofing can be used for a variety of reasons, like phishing attacks, spam, and social engineering.

Why is Email Spoofing Done?

Email spoofing can be done for both malicious and non-malicious purposes. Example: a company might use email spoofing to send emails from a generic email address (“admin@example.com”) instead of an employee’s personal email address. On the other hand, spammers and scammers may use email spoofing to trick recipients into clicking on links or opening attachments that contain malware.

Requirements for Email Spoofing

Below are the Requirements for Email Spoofing:

  1. Spoof Email Sending Script (script.py)
  2. Free SMTP (I’m using sendinblue.com which can send 300 emails for free. No credit card & No documents required for account verification)

Things to change

You need to change the config.ini file and update your SMTP details. And in script.py, you just need to add your target's email address, your spoofed mail id, the message, the subject and you are good to go.

License

GNU General Public License v3.0

Credits

XIT