Automate your workflows, prioritize vulnerabilities, and focus on what truly matters in email security.
Our powerful intelligence tools and automated recon engines give you
unprecedented visibility into complex email routing architectures.
Mailsploit was founded by a team of security researchers and penetration testers who were exhausted by the manual effort required to audit SPF, DKIM, and DMARC alignments. We built this toolkit to automate the repetitive tasks, highlight misconfigurations instantly, and provide weaponized payloads for authorized red team exercises.
Organize, prioritize
and control your security testing
more efficiently in our trusted platform
Everything you need to know about the product and billing.
Compose and transmit test emails
Test server connectivity and authentication
| Port | Protocol | Encryption |
|---|---|---|
| 25 | SMTP | None / STARTTLS |
| 465 | SMTPS | Implicit SSL/TLS |
| 587 | MSA | STARTTLS |
| 2525 | Alt SMTP | STARTTLS |
Bulk SMTP server testing
SPF, DMARC, and spoofing vulnerability analysis
| Policy (p=) | Impact |
|---|---|
| none | Monitor only. Easily spoofable. |
| quarantine | Sent to spam/junk folder. |
| reject | Blocked at gateway. Secure. |
Verify DKIM selector records and key configurations
selector._domainkey.domain.com). Mailsploit automatically iterates through
top providers (Google, Microsoft, SendGrid) to locate active keys.
Analyze raw email headers for security indicators
spf=pass,
dkim=pass, dmarc=pass.
Check IP/Domain against major DNSBLs
zen.spamhaus.orgb.barracudacentral.orgdnsbl.sorbs.netbl.spamcop.netspam.abuse.chDiscover active mail infrastructure
mta2.marketing.target.com)
that might bypass strict main-domain SPF policies.
Check email against data dumps
Generate HTML login form lures
Weaponize VBA payloads
AutoOpen() or Document_Open() triggers. To evade
heuristic sandbox analysis, real-world macros often employ sleep functions, environmental keying
(checking domain membership), or require user interaction (like scrolling) before payload
execution.
Create invisible 1x1 image trackers
Generate Cyrillic look-alike domains
xn--xample-hye.com). However, in many email clients and
plain-text editors, these Unicode strings render identically to their ASCII targets.
Encode email bodies to bypass filters
&#xx;. Good for simple
keyword filters. Mail clients render them back to text transparently.