Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»TempoMail — Command Line Temporary Email in Linux

    TempoMail — Command Line Temporary Email in Linux

    June 2, 2025

    During penetration testing many times we need to register on websites and they send a lots of mails. Even sometime we don’t want to share our original e-mail id. Then how we can hide ourself from website’s eye?

    Well, there are tons of temporary or disposable mail services in market that provides us this feature through their websites but we can’t say what’s running in their backend and we personally hates those annoying ads !!
    Here in this article we will discuss about an open-source command line tool that will provide us a disposable e-mail address. We can use it to bypass e-mail verification of any website.
    Command line temporary email in linux
    This tool is called TempoMail. TempoMail is written in go language by Kavish Gour. First we need to install go language in our Kali Linux system. After installing Go Language we open terminal and clone the GitHub repo by using following command:
    git clone github.com/kavishgr/tempomail
    The screenshot of the command is following:
    Tempomail clonning
     
    Then we need to go inside the temomail directory by using cd command:
    cd tempomail
    Now we need to build this by using following command:
    go build .
    If the building process is successful then we got a file called tempomail in our directory. As we can see in the following screenshot:
    Compailing tempomail

    Now we need to move this tempomail file to /usr/local/bin where the software installed locally by using following command:

    sudo mv tempomail /usr/local/bin/
    The output of the command is shows in the following screenshot:
    moving tempomail file

    Now we have installed tempomail successfully. We can check it via running following command from anywhere in terminal:

    tempomail -h

    Here in the following screenshot we can see that our emails will locally saved on /tmp/1secmails/ by default. We can change it by using -path string.

    Now we can set our custom mail by using tempomail. To do this we run tempomail command in our terminal:

    tempomail
    Then it will ask us the “Input Name”, here we can put anything to get a mail id with thee name(if available on this time) we have putted ‘kalilinux’. As we can see in the following screenshot:
    tempomail custom name

    After this we got a mail id with this name. Shown in the following screenshot:

    custom temp mail id

    Now if anyone send mails on this email id we got the mail. Yoo, We got an e-mail. After we got a mail in our inbox it shows like following:

    tempomail recived

    To open our mailbox we need to open another terminal window and type following command:

    ls /tmp/1secmails/

    The above command shows a mail in the directory.

    tempomail default inbox

    Now we can see what’s inside the mail using cat (or any text viewer or editor tool). We run the following command to see the mail.

    Recived a Mail using tempomail

    This is how we can receive an e-mail on our custom temporary mail id running on command line. We found this good at bypass the e-mail verification during penetration testing and avoid spam or unwanted mails on our original mail id.

    This is how we can create our custom disposable e-mail address directly from our terminal.

    Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxInfamily, join our Telegram Group & Whatsapp Channel. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMongoose Now Natively Supports QE and CSFLE
    Next Article Plotly brings vibe coding to visual data app development

    Related Posts

    News & Updates

    A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

    July 22, 2025
    News & Updates

    “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Distribution Release: Ubuntu MATE 25.04

    News & Updates

    World Backup Day: Why Human Error Remains the Biggest Threat to Data Protection

    Development

    CVE-2023-53122 – RISC-V SiFive Errata Patching Mutex Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-7857 – “PHPGurukul Apartment Visitors Management System Cross Site Scripting Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-2506 – EDB pglogical Replication Connection Verification Bypass

    May 22, 2025

    CVE ID : CVE-2025-2506

    Published : May 22, 2025, 4:15 p.m. | 31 minutes ago

    Description : When pglogical attempts to replicate data, it does not verify it is using a replication connection, which means a user with CONNECT access to a database configured for replication can execute the pglogical command to obtain read access to replicated tables. When pglogical runs it should verify it is running on a replication connection but does not perform this check. This vulnerability was introduced in the pglogical 3.x codebase, which is proprietary to EDB. The same code base has been integrated into BDR/PGD 4 and 5.
    To exploit the vulnerability the attacker needs at least CONNECT permissions to a database configured for replication and must understand a number of pglogical3/BDR specific commands and be able to decode the binary protocol.

    Severity: 5.3 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud

    May 30, 2025

    Minecraft’s ‘Vibrant Visuals’ side-by-side comparison pics — Here’s what it gets right and where it falls short

    July 1, 2025

    CVE-2025-25776 – Codeastro Bus Ticket Booking System XSS

    April 28, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.