Author: Rick Hayes | Version: 2.01 | License: MIT
Overview
Emauler is a professional penetration testing tool designed to simulate phishing campaigns for security awareness training. It requires a LAMP/WAMP stack and a custom SMTP server.
Features
- 15 unique phishing scenarios with follow-up templates
- Bulk email sending via CSV import
- Tracking of email opens and link clicks
- Follow-up emails for non-responders
- Version control with Git
Requirements
- Python 3.x
- MySQL
- Apache with PHP
- SMTP Server
- Registered domain
- Python packages:
mysql-connector-python
,pandas
Installation
- Clone the repository:
git clone https://gitlab.com/encrypter15/emauler.git
- Install LAMP/WAMP stack
- Set up SMTP server
- Run database setup:
mysql -u root -p < setup.sql
- Update
config.py
with your credentials:DOMAIN = "yourdomain.com" SMTP_SERVER = "localhost" SMTP_PORT = 587 SMTP_USER = "phish@yourdomain.com" SMTP_PASS = "yourpassword" DB_HOST = "localhost" DB_USER = "emauler_user" DB_PASS = "db_secure_password" DB_NAME = "emauler_db"
- Place
track.php
andpixel.php
in Apache web root - Install Python dependencies:
pip install mysql-connector-python pandas
Usage
Bulk Email Sending
Create a CSV file (e.g., targets.csv
):
email,scenario target1@example.com,0 target2@example.com,1
Run: python emauler.py --csv targets.csv
Follow-up Emails
Send follow-ups to non-responders: python emauler.py --followup
Single Email
Send to one target: python emauler.py target@example.com 3
Project Structure
emauler/ ├── emauler.py # Main application ├── config.py # Configuration ├── templates.py # Email templates ├── track.php # Click tracking ├── pixel.php # Open tracking ├── setup.sql # Database setup ├── README.md # Project overview ├── CHANGELOG.md # Version history
Version Control
The project uses Git for version control:
- Initial commit:
git add . && git commit -m "Initial commit"
- Push to GitLab:
git remote add origin https://gitlab.com/encrypter15/emauler.git && git push -u origin master
Warning
This tool is for authorized security testing only. Obtain explicit permission from target organizations before use. Misuse may violate laws and regulations.