WhoAmIMailBot : Service To Mask Your E-Mails

WhoAmIMailBot is a service to mask your e-mails. It was inspired by Blur, where you can create an alias for your e-mail and use it to signup on applications. The problem with Blur is that all e-mails pass trough their infraestructure and I don’t need/want anybody looking on my e-mails, so I made this project. It is similar to Blur service but runs on your own infraestructure!

How it works?

You will need:

  • A domain (to not expend money you can use no-ip services);
  • A VPS that allows smtp outbound;
  • A telegram bot ID;
  • Your telegram user ID;
  • This project.

Your VPS will run a postfix that will redirect e-mails using the postfix function of virtual alias (where you can set an e-mail address to redirect all incoming messages to another e-mail), the no-ip domain will be the domain which you’ll use on your alias e-mails and the telegram bot will manage your alias.

Also Read – Versionscan : A PHP Version Scanner For Reporting Possible Vulnerabilities

Installation

  • From source

git clone https://github.com/mthbernardes/WhoAmIMailBot.git
cd WhoAmIMailBot
docker build -t whoamimailbot .
docker run -d -p 25:25 –name whoamimailbot -v /data/postfix/:/data -e TELEGRAM_BOT_TOKEN=”BOT_TOKEN” -e TELEGRAM_USER_ID=”USER_ID”

  • From Hub Docker

You can download the image using the following command:

docker pull btamburi/whoamimailbot

or

docker run -d -p 25:25 –name whoamimailbot -v /data/postfix/:/data -e TELEGRAM_BOT_TOKEN=”BOT_TOKEN” -e TELEGRAM_USER_ID=”USER_I

Environment variables

This image uses environment variables to allow the configuration of some parameteres at run time:

  • TELEGRAM_BOT_TOKEN: Telegram bot token. (Use: @BotFather)
  • TELEGRAM_USER_ID: Your Telegram ID. (Use: @my_id_bot)
  • FAKE_DOMAIN: Your fake domain for receive email. (Example: mailbot.ddns.net )

Usage

On your telegram bot you have the follow commands,

R K

Recent Posts

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

19 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

21 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

23 hours ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

23 hours ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

23 hours ago

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

2 days ago