MXFlex is a versatile, all-round email tool designed for cybersecurity professionals. The tool provides functionalities for analyzing domain records, managing SPF, DKIM, and DMARC records, performing email header and body analysis using local AI models, and generating homoglyph domains, among other features.
- Analyze Domain Records: Analyze SPF, DKIM, and DMARC records for errors or security issues.
- SPF Record Management: Generate, validate, and optimize SPF records.
- DKIM Key Generation and Configuration: Generate DKIM key pairs and manage selectors.
- DMARC Policy Setup and Management: Create and manage DMARC policies.
- Automated Testing and Validation: Automated security testing for email infrastructure.
- Monitoring and Reporting: Real-time monitoring and reporting tools for email security.
- Automated Analysis: Integrates with ChatGPT for comprehensive analysis and recommendations.
- Ollama Self-Hosted Email Analyzer: Perform email header and body analysis using a locally hosted Ollama AI model.
- Generate Homoglyph Domains: Create similar-looking domains for phishing or security testing.
- Generate IP Logger Link: Create IP logger links for tracking purposes.
- Generate Pretexting Messages: Generate persuasive pretexting messages for social engineering.
- Banner Grabbing (SMTP and POP3): Retrieve server banners for enumeration.
- Enumerate SMTP Users: Identify valid SMTP users using VRFY and RCPT TO commands.
- Brute-force SMTP Authentication: Test SMTP authentication using a dictionary attack.
- Gemini Email Analyzer: Analyze emails using the Gemini AI model.
To install and run MXFlex, follow these steps:
-
Clone the repository:
git clone https://github.com/scs-labrat/mxflex.git cd mxflex
-
Install the required Python packages:
pip install click requests colorama python-dotenv ollama openai canvasapi dnspython fpdf beautifulsoup4 cryptography selenium pyfiglet
-
Set up necessary environment variables:
- Create a
.env
file in the root directory. - Add your API keys and other environment variables:
MXTOOLBOX_API_KEY=<your_mxtoolbox_api_key> GEMINI_API_KEY=<your_gemini_api_key>
- Create a
-
Download necessary browser drivers for Selenium:
- For example, download ChromeDriver and place it in your desired directory.
- Update the path in the script accordingly.
To run the tool, navigate to the directory where mxflex.py
is located and run:
python mxflex.py
Upon running the script, you will be presented with the main menu:
- 1. Whitehat: Access tools for cybersecurity defense and email security management.
- 2. Blackhat: Access tools for offensive cybersecurity and penetration testing.
- 3. Exit: Exit the program.
The Whitehat menu provides tools for analyzing and securing email systems:
- Analyze Domain Records: Check SPF, DKIM, and DMARC records.
- SPF Record Management: Generate, validate, and optimize SPF records.
- DKIM Key Generation and Configuration: Generate and manage DKIM keys.
- DMARC Policy Setup and Management: Set up and manage DMARC policies.
- Automated Testing and Validation: Coming soon.
- Monitoring and Reporting: Coming soon.
- Automated Analysis: Submit domain records to ChatGPT for analysis.
- Ollama Self-Hosted Email Analyzer: Analyze email headers and bodies using Ollama AI.
The Blackhat menu provides tools for offensive testing and research:
- Generate Homoglyph Domains: Generate domains that look similar to the target domain.
- Generate IP Logger Link: Create links that log the IP addresses of visitors.
- Generate Pretexting Messages: Create customized social engineering messages.
- Banner Grabbing (SMTP/POP3): Collect server banners for further analysis.
- Enumerate SMTP Users: Use VRFY and RCPT TO commands to find valid email addresses.
- Brute-force SMTP Authentication: Attempt to brute-force email credentials.
- Gemini Email Analyzer: Analyze email content using OpenAI's GPT-4.
-
Python 3.8 or higher
-
Required Python libraries:
click
colorama
requests
dnspython
fpdf
ollama
openai
selenium
beautifulsoup4
cryptography
- etc.
-
Browser Drivers for Selenium (e.g., ChromeDriver)
- API Keys: Ensure you have valid API keys set up in your environment.
- Local AI Models: Ollama needs to be running locally for self-hosted analysis.
- SMTP and POP3 Servers: Ensure you have the necessary permissions to perform banner grabbing and user enumeration.
This project is licensed under the MIT License - see the LICENSE file for details.