mirror of
				https://github.com/mgeeky/Penetration-Testing-Tools.git
				synced 2025-11-04 04:55:26 +01:00 
			
		
		
		
	update
This commit is contained in:
		@@ -9,15 +9,24 @@ Resulting output will contain useful information on why this e-mail might have b
 | 
			
		||||
 | 
			
		||||
### Example screenshots
 | 
			
		||||
 | 
			
		||||
- Chain of MTA servers (nicely parsed `Received` headers):
 | 
			
		||||
 | 
			
		||||

 | 
			
		||||
 | 
			
		||||
- Various headers decoded as much as possible, according to publicly available documentation (here _Office365 ForeFront Spam Report_):
 | 
			
		||||
 | 
			
		||||

 | 
			
		||||
 | 
			
		||||
- Different custom heuristics implement to actively validate and seek for clues of spam categorization, here logic detecting _Domain Impersonation_:
 | 
			
		||||
 | 
			
		||||

 | 
			
		||||
 | 
			
		||||
- Script attempts to reverse-engineer and document some of the Office365 Anti-Spam rules, as well as collect public knowledge about other opaque Anti-Spam headers:
 | 
			
		||||
 | 
			
		||||

 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
### Processed headers
 | 
			
		||||
 | 
			
		||||
Processed headers (more than **67+** headers are parsed):
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user