drop multiple eml files or paste headers · detect display name spoofing domain lookalikes and reply-to hijacking · identify impersonation patterns targeting specific individuals or organizations · surface BEC and CEO fraud indicators · runs locally
comma-separated legitimate domains for enhanced lookalike detection
loading impersonation brand database…