A tool designed to simulate human-like email behavior for use in advanced social engineering campaigns, such as QR phishing, APT simulations, and targeted Red Team engagements.
This tool aims to improve deliverability and avoid detection by spam filters through evasion techniques, such as:
- Injection of invisible characters in subject and body.
- Randomized and configurable sending delays (mimicking human timing).
- HTML email support with optional embedded images.
π Passwords are never stored or logged β inputs are used only during the current session.
- β Sends emails with configurable subject, body, and embedded image (optional).
- β
Reads target recipients from
.txtfiles (one email per line). - β Includes invisible Unicode characters randomly for evasion.
- β Simulates human behavior via randomized time delays.
- β Logs each sent or failed email with timestamp.
- β Works with any SMTP provider supporting TLS login (e.g. Brevo, Mailjet, Mailchimp, SendGrid, Gmail, Hostinger, Outlook, etc.).
Create a text file in the working directory, for example:
recipients.txtContents:
alice@example.com
bob@example.org
charlie@example.net
You can embed an image (e.g., a QR code or branding asset) into the HTML body of the email. Only .jpg, .jpeg,.png images in the current folder will be detected.
- Run the tool:
python email_sender.py
Install via pip install -r requirements.txt. The tool uses:
coloramapytz
These are lightweight libraries used for colored output and timezone handling.
Simulate a fake promotion with an embedded QR code and custom HTML body, delayed sending, and evasion via invisible characters.
Send realistic, delayed, human-like phishing emails during a long-running campaign.
Each execution generates a log file like:
logs_campaign_20250718_180429.log
It contains the timestamp, status (SENT/FAIL), and recipient address.
This tool is intended for educational and authorized Red Team use only. Use it only in environments where you have explicit permission to conduct phishing simulations or social engineering exercises.
Unauthorized use of this tool may violate laws or ethical boundaries.
Developed by C0mm4nd1 - Red Teamer & Offensive Security Consultant