mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2025-09-03 02:28:34 +02:00
update
This commit is contained in:
@ -1,4 +1,4 @@
|
||||
## `decode-spam-headers.py`**
|
||||
## `decode-spam-headers.py`
|
||||
|
||||
This tool accepts on input an `*.EML` or `*.txt` file with all the SMTP headers. It will then extract a subset of interesting headers and using **79+** tests will attempt to decode them as much as possible.
|
||||
|
||||
@ -6,6 +6,20 @@ This script also extracts all IPv4 addresses and domain names and performs full
|
||||
|
||||
Resulting output will contain useful information on why this e-mail might have been blocked.
|
||||
|
||||
|
||||
### Example screenshots
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
|
||||
### Processed headers
|
||||
|
||||
Processed headers (more than **67+** headers are parsed):
|
||||
|
||||
- `X-forefront-antispam-report`
|
||||
@ -107,16 +121,6 @@ Tests:
|
||||
-a, --decode-all Decode all =?us-ascii?Q? mail encoded messages and print their contents.
|
||||
```
|
||||
|
||||
### Example screenshots
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
|
||||
### Sample run
|
||||
|
||||
|
Reference in New Issue
Block a user