We send mail as your domain. To prove anyone can.

Authex Red runs real attacker techniques against your domains in production. You get a report of what actually reached the inbox, what didn't, and what to fix.

Request access

Closed intake. Vetted before scope.

Monitoring tools see traffic that reached you. Red shows what attackers can still send as you.

Your DMARC dashboard sees the mail you receive. It does not see whether a spoofed message in your customer's inbox would pass authentication today. Red answers that question.

Run Red before the Agent. Then run it again.

Before, Red shows you what an attacker can still send as you. Those findings become the Agent's punch list. After, the same techniques run again. If anything still lands, the enforcement has gaps to close.

How an engagement runs.

Four phases produce one report. Fixed scope. We bring our own infrastructure. You provide the domains and the authorised recipients.

The process
Phase 01

Request.

You tell us who you are and what you want to test. We vet every request before scope.

Phase 02

Scope.

Up to three domains, up to five authorised recipients. Engagement window agreed in writing.

Phase 03

Pressure-test.

We run real attacker techniques against the agreed scope. No production impact, no surprises.

Phase 04

Report.

You get a report of what reached the inbox, what was blocked, and what to fix first.

The deliverable
Part 01

Executive summary.

Decision-ready. What is exploitable today, what is not, and what changes by next quarter if you do nothing.

Part 02

Technical findings.

Per domain. Which attack categories reached the inbox, with evidence captured during the engagement.

Part 03

Remediation playbook.

The DNS and policy changes that close each finding, in the order you should apply them.

Request an engagement.

We reply within two business days. Every engagement is vetted before we share a quote.

red@authexlabs.com · Closed intake · Vetted before scope.