Simple API to scans SPF, DMARC, DKIM records for issues that could allow email spoofing.
 
 
Go to file
Muhammad Daffa 887030ec8d feat: change it into CLI 2023-08-14 12:36:19 +07:00
Dockerfile feat: change it into CLI 2023-08-14 12:36:19 +07:00
LICENSE Initial commit 2021-04-22 08:52:12 +07:00
README.md feat: change it into CLI 2023-08-14 12:36:19 +07:00
main.php feat: change it into CLI 2023-08-14 12:36:19 +07:00

README.md

MailSpoof

MailSpoof is a simple program that scans SPF and DMARC records for issues that could allow email spoofing.

Getting Started

Follow these steps to use the MailSpoof tool using Docker:

Prerequisites

  • Docker installed on your system

Usage

  1. Clone this repository:
git clone https://github.com/yourusername/YourRepositoryName.git
cd YourRepositoryName
  1. Build the Docker image:
docker build -t mailspoof .
  1. Run the Docker container and specify the target URL (replace <url> with the actual URL):
docker run --rm mailspoof <url> [--output=json]

Replace <url> with the target URL you want to check. You can also include the --output=json flag if you want JSON output.

  1. Access the output:

To access the output, copy the output.txt file from the container to your host system:

docker cp <container_id>:/app/output.txt ./output.txt

License

This project is licensed under the MIT License - see the LICENSE file for details.