Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Email Spoofing (Using an SMTP server)
  • Email Tracker
  • Fake Mailer
  • HTML Emails Templates
  1. Phishing Attacks

Emails Tricks

PreviousKali Pre-Installed ToolsNextHow to secure yourself from phishing attacks

Last updated 1 year ago

Email Spoofing (Using an SMTP server)

Thanks To for the great !

Email Tracker

Find out if your emails get read. Free & unlimited email tracking for Gmail, Outlook / Hotmail, Office 365 & Yahoo Mail Inbox.

Find out if your emails were read. Simply install and any future emails are automatically tracked. A circle will appear when the tracking is enabled on the sent email and a checkmark will appear when it has been read. Works for unlimited email accounts and sent emails.

Works with Gmail, Outlook / Hotmail, Office 365 Outlook, and Yahoo Mail

Fake Mailer

Fake Mailer is a tool to send mail anonymously from a different email. This process can take up to 5 minutes. This tool is created for Educational Purpose Only

HTML Emails Templates

You can learn more about Email Spoofing on created by

This YouTube Video/Tutorial
zSecurity
CyberSudo
video
Email Tracker
GitHub - htr-tech/fake-mailer: Send Mail Anonymously with this ScriptGitHub
1240+ Free HTML Professional Email TemplatesBEE free
Email Tracker for Gmail, Mail Merge-Mailtrack
Logo
Logo
Logo
Free HTML Email Templates and Editor
1400+ Free HTML Email Templates & Newsletters — Stripo.emailStripo.email
Logo
1,000+ FREE HTML Email & Newsletters Templates — Mailmunch
Logo
Logo
Logo