コンテンツにスキップ

h8mail

pip install h8mail
git clone https://github.com/khast3x/h8mail.git
cd h8mail
pip install -r requirements.txt
python h8mail.py
h8mail --version

Create a ~/.h8mail_rc configuration file:

[breaches]
hibp_api_key = YOUR_HIBP_API_KEY
snusbase_auth = YOUR_SNUSBASE_TOKEN
leakcheck_api_key = YOUR_LEAKCHECK_API_KEY
emailrep_api_key = YOUR_EMAILREP_API_KEY

Or set environment variables:

export HIBP_API_KEY="your_key_here"
export SNUSBASE_AUTH="your_token_here"
ServiceTypeAPI RequiredNotes
HaveIBeenPwned (HIBP)Breach DBYesMost comprehensive, 613M+ breaches
SnusbaseBreach DBYesLarge Russian breach database
LeakCheckBreach DBYesExtensive leak collection
EmailRepReputationYesEmail reputation & breach data
DehashedBreach DBYesDark web breach database
IntelxBreach DBYesIntelligence X platform
ScyllaBreach DBNoFree online breach search
ShodanIP LookupYesInternet-connected devices
h8mail -e target@example.com
h8mail -e target@example.com -v
h8mail -e target@example.com --only hibp
h8mail -e target@example.com --only hibp,snusbase,leakcheck
h8mail -l emails.txt
target1@example.com
target2@example.com
admin@company.org
user@domain.net
h8mail -l emails.txt -o results.txt
h8mail -l emails.txt --delay 2
h8mail -e target@example.com -ldb /path/to/breach_database.txt
h8mail -e target@example.com -ldb breaches/ passwords/
h8mail -e target@example.com --local-only -ldb database.csv
h8mail -e target@example.com --chase
h8mail -e target@example.com --chase -c 2
h8mail -e admin@company.com --chase --max-distance 3

This finds other email addresses from breaches and searches those recursively.

h8mail -e target@example.com -o results.json --json
h8mail -l emails.txt -o results.csv --csv
h8mail -e target@example.com -o results.txt
h8mail -l emails.txt -o report.html --html
h8mail -l company_employees.txt -o breach_report.txt

Credential hunting for penetration testing

Section titled “Credential hunting for penetration testing”
h8mail -e target@example.com -v --paste
h8mail -e leaked_email@domain.com --chase
h8mail -e ceo@company.com -v --all-providers
h8mail -e target@example.com -v
h8mail -e target@example.com --timeout 10
h8mail -e target@example.com --proxy socks5://127.0.0.1:9050
h8mail -e target@example.com --paste -o pastes/
h8mail -e target@example.com --no-color
h8mail -l emails.txt --dry-run
theharvester -d example.com -b all | grep "@" | tee emails.txt
h8mail -l emails.txt -o results.txt

Export email addresses from Maltego → Import to h8mail

h8mail -e admin@example.com --shodan
h8mail -e user@example.com -v | grep -i "password\|username"
for email in $(cat targets.txt); do
  h8mail -e "$email" -o "results_${email}.txt"
done
#!/bin/bash
DATE=$(date +%Y%m%d)
h8mail -l critical_emails.txt -o "breach_report_${DATE}.txt"
h8mail -e target@example.com --json | jq '.[] | select(.breaches | length > 0)'
import subprocess
import json

result = subprocess.run(
    ['h8mail', '-e', 'target@example.com', '--json'],
    capture_output=True,
    text=True
)
data = json.loads(result.stdout)
h8mail -e suspicious@company.com
h8mail -l company_staff.txt -o security_audit.txt

Incident response - find compromised accounts

Section titled “Incident response - find compromised accounts”
h8mail -e compromised@domain.com -v --all-providers
h8mail -e attacker@evil.com --chase -v
h8mail -l internal_users.txt -o credstuffing_risk.json --json
# Verify config file exists
cat ~/.h8mail_rc

# Check environment variable
echo $HIBP_API_KEY
# Add delay between requests
h8mail -l emails.txt --delay 3
# Disable SSL verification (use cautiously)
h8mail -e target@example.com --insecure
# Increase timeout
h8mail -e target@example.com --timeout 30
# Process in chunks
split -l 100 emails.txt email_chunk_
for file in email_chunk_*; do h8mail -l "$file"; done
  • API Limits: Respect rate limits; use delays between bulk searches
  • Privacy: Only scan email addresses you have authorization to test
  • Storage: Securely store breach data and results
  • Updates: Keep h8mail updated for new breach service integrations
  • Filtering: Use —only flag to query specific services and save API quota
  • Logging: Combine -v and -o flags for detailed searchable results
  • Automation: Use JSON output for automated parsing in scripts