A fast and efficient scanner for identifying email spoofing vulnerabilities through SPF and DMARC record analysis on domains.
- Multi-threaded: Parallel execution for maximum performance
- Precise detection: Identifies vulnerable SPF/DMARC configurations
- Colored output: Clear visualization of security status
- Detailed analysis: Shows exactly which records are misconfigured
- ❌ Missing SPF record
- ❌ Weak policies:
~all(SoftFail),+all(Pass),?all(Neutral) - ❌ Missing
-all: No Hard Fail implementation - ❌ Misconfigured redirects
- ❌ Missing DMARC record
- ❌ Policy
p=none: Doesn't reject suspicious emails - ❌ Low percentage:
pct=0orpct=1 - ❌ Missing restrictive policies: No
quarantineorreject
# Clone the repository
git clone https://github.com/pad1ryoshi/espoofing.git
cd espoofing
# Build the binary
go build -o espoofing espoofing.go./espoofing domains.txt./espoofing domains.txt 50 10
# ^ ^
# | timeout (seconds)
# threadsmail.example.com
subdomain1.target.com
subdomain2.target.com
app.vulnerable-site.com
[+] SPF/DMARC Scanner - Email Spoofing Vulnerability Checker
[+] Threads: 20, Timeout: 5s
[+] Scanning domains from: domains.txt
------------------------------------------------------------
[*] Domain: mail.example.com
SPF: [VULNERABLE]
v=spf1 include:_spf.google.com ~all
DMARC: [NOT FOUND - VULNERABLE]
[!] SPOOFING POSSIBLE
[*] Domain: secure.example.com
SPF: [OK]
v=spf1 include:_spf.google.com -all
DMARC: [OK]
v=DMARC1; p=reject; rua=mailto:dmarc@example.com
| Parameter | Default | Description |
|---|---|---|
threads |
20 | Number of concurrent threads |
timeout |
5s | DNS query timeout |
The scanner performs DNS TXT record lookups to:
- SPF Analysis: Checks for presence and strength of SPF policies
- DMARC Analysis: Validates DMARC policies and percentages
- Vulnerability Assessment: Identifies exploitable configurations
// Weak configurations detected:
- Missing SPF record
- Soft fail (~all) allows spoofing
- Pass (+all) allows any IP
- Neutral (?all) performs no check
- Missing hard fail (-all)// Weak configurations detected:
- Missing DMARC record
- Policy "none" (p=none)
- Low enforcement percentage
- Missing quarantine/reject policiesThis tool is intended for:
- ✅ Authorized security testing
- ✅ Bug bounty programs
- ✅ Educational purposes
- ✅ Internal security assessments
Always ensure proper authorization before testing any domains.