Verify whether the domain is vulnerable to spoofing by Email-vulnerablity-checker
- Added Support to save output on a file using -o flag
- Added more checks that will accurately tell you the Vulnerability Status.
- Updated the code completely with proper and accurate results.
- Enhanced the tool and decorated some look and feel on the tool.
Email Vulnerability Checker
This script checks the SPF and DMARC configurations of email domains to determine their vulnerability status. It's useful for system administrators or security professionals to assess email infrastructure security.
To run the script, execute it with the following command:
./spfvuln.sh [options]
- -h, --help: Display the help message.
- -v: Display the version of the script.
- -t : Specify a file containing a list of domains to check.
- -d : Specify a single domain to check.
- -o <output.txt>: Specify an output file to save the results.
- Bash-compatible shell: Ensure your system supports Bash scripting.
- nslookup command: Make sure the nslookup command is installed and available in your system's PATH.
- Checking a single domain:
./spfvuln.sh -d example.com
- Checking multiple domains from a file:
./spfvuln.sh -t domains.txt
- Saving results to an output file:
./spfvuln.sh -d example.com -o output.txt
This Email Vulnerability Checker script was created by BLACK-SCORP10. For queries or feedback, contact the author via Telegram: BLACK-SCORP10.
Current version: 2.0
This script is provided as-is, Use it at your own risk.
For Queries: Telegram
Contributions, issues, and feature requests are welcome!
Give a ★ if you like this project!
This project is licensed under the MIT License - see the LICENSE file for details.