h8mail
Installation
Section titled “Installation”Install via pip
Section titled “Install via pip”pip install h8mail
Install from source
Section titled “Install from source”git clone https://github.com/khast3x/h8mail.git
cd h8mail
pip install -r requirements.txt
python h8mail.py
Verify installation
Section titled “Verify installation”h8mail --version
Configuration
Section titled “Configuration”API Key Setup
Section titled “API Key Setup”Create a ~/.h8mail_rc configuration file:
[breaches]
hibp_api_key = YOUR_HIBP_API_KEY
snusbase_auth = YOUR_SNUSBASE_TOKEN
leakcheck_api_key = YOUR_LEAKCHECK_API_KEY
emailrep_api_key = YOUR_EMAILREP_API_KEY
Or set environment variables:
export HIBP_API_KEY="your_key_here"
export SNUSBASE_AUTH="your_token_here"
Supported Breach Services
Section titled “Supported Breach Services”| Service | Type | API Required | Notes |
|---|---|---|---|
| HaveIBeenPwned (HIBP) | Breach DB | Yes | Most comprehensive, 613M+ breaches |
| Snusbase | Breach DB | Yes | Large Russian breach database |
| LeakCheck | Breach DB | Yes | Extensive leak collection |
| EmailRep | Reputation | Yes | Email reputation & breach data |
| Dehashed | Breach DB | Yes | Dark web breach database |
| Intelx | Breach DB | Yes | Intelligence X platform |
| Scylla | Breach DB | No | Free online breach search |
| Shodan | IP Lookup | Yes | Internet-connected devices |
Single Email Lookup
Section titled “Single Email Lookup”Basic email search
Section titled “Basic email search”h8mail -e target@example.com
Search with verbose output
Section titled “Search with verbose output”h8mail -e target@example.com -v
Search specific service only
Section titled “Search specific service only”h8mail -e target@example.com --only hibp
Search multiple services
Section titled “Search multiple services”h8mail -e target@example.com --only hibp,snusbase,leakcheck
Bulk Email Searching
Section titled “Bulk Email Searching”Search from file
Section titled “Search from file”h8mail -l emails.txt
Email file format
Section titled “Email file format”target1@example.com
target2@example.com
admin@company.org
user@domain.net
Search with custom output file
Section titled “Search with custom output file”h8mail -l emails.txt -o results.txt
Batch processing with rate limiting
Section titled “Batch processing with rate limiting”h8mail -l emails.txt --delay 2
Local Breach File Searching
Section titled “Local Breach File Searching”Search local breach database
Section titled “Search local breach database”h8mail -e target@example.com -ldb /path/to/breach_database.txt
Search multiple local files
Section titled “Search multiple local files”h8mail -e target@example.com -ldb breaches/ passwords/
Import and index local breaches
Section titled “Import and index local breaches”h8mail -e target@example.com --local-only -ldb database.csv
Chase Mode - Trace Related Emails
Section titled “Chase Mode - Trace Related Emails”Enable chase mode for related accounts
Section titled “Enable chase mode for related accounts”h8mail -e target@example.com --chase
Chase mode with depth limit
Section titled “Chase mode with depth limit”h8mail -e target@example.com --chase -c 2
Chase related emails found in breaches
Section titled “Chase related emails found in breaches”h8mail -e admin@company.com --chase --max-distance 3
This finds other email addresses from breaches and searches those recursively.
Output Formats
Section titled “Output Formats”JSON output
Section titled “JSON output”h8mail -e target@example.com -o results.json --json
CSV output
Section titled “CSV output”h8mail -l emails.txt -o results.csv --csv
Plain text output (default)
Section titled “Plain text output (default)”h8mail -e target@example.com -o results.txt
HTML report output
Section titled “HTML report output”h8mail -l emails.txt -o report.html --html
Searching Strategies
Section titled “Searching Strategies”Company domain reconnaissance
Section titled “Company domain reconnaissance”h8mail -l company_employees.txt -o breach_report.txt
Credential hunting for penetration testing
Section titled “Credential hunting for penetration testing”h8mail -e target@example.com -v --paste
Combine with other data
Section titled “Combine with other data”h8mail -e leaked_email@domain.com --chase
High-priority target search
Section titled “High-priority target search”h8mail -e ceo@company.com -v --all-providers
Advanced Options
Section titled “Advanced Options”Show all breaches (verbose)
Section titled “Show all breaches (verbose)”h8mail -e target@example.com -v
Skip unresponsive services
Section titled “Skip unresponsive services”h8mail -e target@example.com --timeout 10
Use proxies
Section titled “Use proxies”h8mail -e target@example.com --proxy socks5://127.0.0.1:9050
Save paste dumps when found
Section titled “Save paste dumps when found”h8mail -e target@example.com --paste -o pastes/
Disable colors in output
Section titled “Disable colors in output”h8mail -e target@example.com --no-color
Check before running bulk operations
Section titled “Check before running bulk operations”h8mail -l emails.txt --dry-run
Integration with OSINT Workflows
Section titled “Integration with OSINT Workflows”Combine with TheHarvester
Section titled “Combine with TheHarvester”theharvester -d example.com -b all | grep "@" | tee emails.txt
h8mail -l emails.txt -o results.txt
Combine with Maltego
Section titled “Combine with Maltego”Export email addresses from Maltego → Import to h8mail
Use in Shodan queries
Section titled “Use in Shodan queries”h8mail -e admin@example.com --shodan
Parse breach data for usernames
Section titled “Parse breach data for usernames”h8mail -e user@example.com -v | grep -i "password\|username"
Automation and Scripting
Section titled “Automation and Scripting”Batch processing with shell loop
Section titled “Batch processing with shell loop”for email in $(cat targets.txt); do
h8mail -e "$email" -o "results_${email}.txt"
done
Automated daily monitoring
Section titled “Automated daily monitoring”#!/bin/bash
DATE=$(date +%Y%m%d)
h8mail -l critical_emails.txt -o "breach_report_${DATE}.txt"
Integration with bash automation
Section titled “Integration with bash automation”h8mail -e target@example.com --json | jq '.[] | select(.breaches | length > 0)'
Python scripting
Section titled “Python scripting”import subprocess
import json
result = subprocess.run(
['h8mail', '-e', 'target@example.com', '--json'],
capture_output=True,
text=True
)
data = json.loads(result.stdout)
Common Workflows
Section titled “Common Workflows”Verify email in breach databases
Section titled “Verify email in breach databases”h8mail -e suspicious@company.com
Monitor employee email safety
Section titled “Monitor employee email safety”h8mail -l company_staff.txt -o security_audit.txt
Incident response - find compromised accounts
Section titled “Incident response - find compromised accounts”h8mail -e compromised@domain.com -v --all-providers
Threat hunting - trace attacker email
Section titled “Threat hunting - trace attacker email”h8mail -e attacker@evil.com --chase -v
Credential stuffing assessment
Section titled “Credential stuffing assessment”h8mail -l internal_users.txt -o credstuffing_risk.json --json
Troubleshooting
Section titled “Troubleshooting”API key not recognized
Section titled “API key not recognized”# Verify config file exists
cat ~/.h8mail_rc
# Check environment variable
echo $HIBP_API_KEY
Rate limiting errors
Section titled “Rate limiting errors”# Add delay between requests
h8mail -l emails.txt --delay 3
SSL certificate errors
Section titled “SSL certificate errors”# Disable SSL verification (use cautiously)
h8mail -e target@example.com --insecure
Timeout issues
Section titled “Timeout issues”# Increase timeout
h8mail -e target@example.com --timeout 30
Large file handling
Section titled “Large file handling”# Process in chunks
split -l 100 emails.txt email_chunk_
for file in email_chunk_*; do h8mail -l "$file"; done
Best Practices
Section titled “Best Practices”- API Limits: Respect rate limits; use delays between bulk searches
- Privacy: Only scan email addresses you have authorization to test
- Storage: Securely store breach data and results
- Updates: Keep h8mail updated for new breach service integrations
- Filtering: Use —only flag to query specific services and save API quota
- Logging: Combine -v and -o flags for detailed searchable results
- Automation: Use JSON output for automated parsing in scripts
Resources
Section titled “Resources”- GitHub: https://github.com/khast3x/h8mail
- Documentation: https://github.com/khast3x/h8mail/wiki
- API Keys: Register with individual breach services for API access
- OSINT Tools: Integrate with Shodan, Maltego, TheHarvester