A commercial phishing-as-a-service toolkit distributed via npm for 9 months. Includes DKIM spoofing with stolen private keys, Google/Microsoft OAuth replay attacks, anti-spam fingerprint evasion, SMS phishing via Twilio, QR code phishing, IMAP inbox harvesting, and pre-configured SMTP gateways for major carriers. Functions accept victimList and burnerEmail parameters.
nolimit-x is a commercial phishing-as-a-service toolkit sold via npm with 95 versions. It includes DKIM spoofing, Google/Microsoft OAuth replay attacks, anti-spam fingerprint evasion, and SMS phishing via Twilio. Functions accept victimList and burnerEmail parameters.
Generates forged DKIM signatures for arbitrary domains. Loads stolen private keys. Uses VulnerabilityDatabase to find exploitable DKIM configurations.
async setupGoogleOAuthReplay(burnerEmail, burnerPass, phishingMessage, victimList) {
// Step 1: Create OAuth app with phishing message in name
// Step 2: Trigger security alert (simulated)
// Step 3: Setup forwarder transport
// Step 4: Forward to victims with preserved DKIM
}
Same attack chain for Microsoft 365.
Mutates HTML email content: comment injection, CSS reordering, attribute shuffling, entity swaps. Three intensity levels. Specifically designed to bypass spam filter fingerprinting.
npm Acceptable Content policy item 3 prohibits "malicious computer code" and states "exploits and malware that use the npm registry as a deployment or delivery vector are not" acceptable. Item 5 of Acceptable Use: "You will not violate any applicable law." This toolkit facilitates violations of CAN-SPAM Act, CFAA, and Computer Misuse Act.
Detected by: npm-sentinel automated scanner Reported to npm: 2026-04-03 Date: 2026-04-03