All Projects → khast3x → H8mail

khast3x / H8mail

Licence: other
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email

Programming Languages

python
139335 projects - #7 most used programming language
Makefile
30231 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to H8mail

Iky
OSINT Project
Stars: ✭ 203 (-90.61%)
Mutual labels:  osint, email, hacking, recon
Oblivion
Data leak checker & OSINT Tool
Stars: ✭ 237 (-89.04%)
Mutual labels:  osint, email, password, leak
PwnedPasswordsChecker
Search (offline) if your password (NTLM or SHA1 format) has been leaked (HIBP passwords list v8)
Stars: ✭ 52 (-97.6%)
Mutual labels:  osint, password, leak, hibp
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-88.35%)
Mutual labels:  osint, hacking, recon
Mosint
An automated e-mail OSINT tool
Stars: ✭ 184 (-91.49%)
Mutual labels:  osint, email, hacking
Sitedorks
Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term with a default set of websites, bug bounty programs or a custom collection.
Stars: ✭ 221 (-89.78%)
Mutual labels:  osint, hacking, recon
Striker
Striker is an offensive information and vulnerability scanner.
Stars: ✭ 1,851 (-14.42%)
Mutual labels:  email, recon, theharvester
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-95.15%)
Mutual labels:  osint, hacking, recon
Leakfa.com
A simple way to know if you are on the list of major security breaches like "HIBP", but it is specific for Iran.
Stars: ✭ 106 (-95.1%)
Mutual labels:  osint, leak, breach
Socialpwned
SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-95.19%)
Mutual labels:  osint, hacking, haveibeenpwned
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-87.56%)
Mutual labels:  osint, hacking, recon
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-92.19%)
Mutual labels:  osint, hacking, recon
hibpwned
Python API wrapper for haveibeenpwned.com (API v3)
Stars: ✭ 21 (-99.03%)
Mutual labels:  hibp, haveibeenpwned, breach
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-80.26%)
Mutual labels:  osint, hacking, recon
Karma
Find leaked emails with your passwords
Stars: ✭ 154 (-92.88%)
Mutual labels:  osint, email, password
Reconspider
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (-71.29%)
Mutual labels:  osint, hacking, recon
Cr3dov3r
Know the dangers of credential reuse attacks.
Stars: ✭ 1,700 (-21.41%)
Mutual labels:  hacking, leak, haveibeenpwned
XposedOrNot
XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.
Stars: ✭ 120 (-94.45%)
Mutual labels:  osint, recon, breach-compilation
Favfreak
Making Favicon.ico based Recon Great again !
Stars: ✭ 564 (-73.93%)
Mutual labels:  osint, hacking, recon
Simplyemail
Email recon made fast and easy, with a framework to build on
Stars: ✭ 779 (-63.99%)
Mutual labels:  hacking, recon, kali

platforms PyPI version PyPI - Python Version Downloads travis
Docker Pulls
h8mail is an email OSINT and breach hunting tool using different breach and reconnaissance services, or local breaches such as Troy Hunt's "Collection1" and the infamous "Breach Compilation" torrent.



📖 Table of Content


🍊 Features

  • 🔎 Email pattern matching (reg exp), useful for reading from other tool outputs
  • 🌍 Pass URLs to directly find and target emails in pages
  • 💫 Loosey patterns for local searchs ("john.smith", "evilcorp")
  • 📦 Painless install. Available through pip, only requires requests
  • Bulk file-reading for targeting
  • 📝 Output to CSV file or JSON
  • 💪 Compatible with the "Breach Compilation" torrent scripts
  • 🏠 Search cleartext and compressed .gz files locally using multiprocessing
    • 🌀 Compatible with "Collection#1"
  • 🔥 Get related emails
  • 🐲 Chase related emails by adding them to the ongoing search
  • 👑 Supports premium lookup services for advanced users
  • 🏭 Custom query premium APIs. Supports username, hash, ip, domain and password and more
  • 📚 Regroup breach results for all targets and methods
  • 👀 Includes option to hide passwords for demonstrations
  • 🌈 Delicious colors

📦 pip3 install h8mail


APIs

Service Functions Status
HaveIBeenPwned(v3) Number of email breaches 🔑
HaveIBeenPwned Pastes(v3) URLs of text files mentioning targets 🔑
Hunter.io - Public Number of related emails
Hunter.io - Service (free tier) Cleartext related emails, Chasing 🔑
Snusbase - Service Cleartext passwords, hashs and salts, usernames, IPs - Fast 🔑
Leak-Lookup - Public Number of search-able breach results (🔑)
Leak-Lookup - Service Cleartext passwords, hashs and salts, usernames, IPs, domain 🔑
Emailrep.io - Service (free) Last seen in breaches, social media profiles 🔑
scylla.so - Service (free) Cleartext passwords, hashs and salts, usernames, IPs, domain 🚧
Dehashed.com - Service Cleartext passwords, hashs and salts, usernames, IPs, domain 🔑
IntelX.io - Service (free trial) Cleartext passwords, hashs and salts, usernames, IPs, domain, Bitcoin Wallets, IBAN 🔑
🆕 Breachdirectory.tk - Service (free) Cleartext passwords, hashs and salts, usernames, domain 🔑

🔑 - API key required


🍊 Usage

usage: h8mail [-h] [-t USER_TARGETS [USER_TARGETS ...]]
              [-u USER_URLS [USER_URLS ...]] [-q USER_QUERY] [--loose]
              [-c CONFIG_FILE [CONFIG_FILE ...]] [-o OUTPUT_FILE]
              [-j OUTPUT_JSON] [-bc BC_PATH] [-sk]
              [-k CLI_APIKEYS [CLI_APIKEYS ...]]
              [-lb LOCAL_BREACH_SRC [LOCAL_BREACH_SRC ...]]
              [-gz LOCAL_GZIP_SRC [LOCAL_GZIP_SRC ...]] [-sf]
              [-ch [CHASE_LIMIT]] [--power-chase] [--hide] [--debug]
              [--gen-config]

Email information and password lookup tool

optional arguments:
  -h, --help            show this help message and exit
  -t USER_TARGETS [USER_TARGETS ...], --targets USER_TARGETS [USER_TARGETS ...]
                        Either string inputs or files. Supports email pattern
                        matching from input or file, filepath globing and
                        multiple arguments
  -u USER_URLS [USER_URLS ...], --url USER_URLS [USER_URLS ...]
                        Either string inputs or files. Supports URL pattern
                        matching from input or file, filepath globing and
                        multiple arguments. Parse URLs page for emails.
                        Requires http:// or https:// in URL.
  -q USER_QUERY, --custom-query USER_QUERY
                        Perform a custom query. Supports username, password,
                        ip, hash, domain. Performs an implicit "loose" search
                        when searching locally
  --loose               Allow loose search by disabling email pattern
                        recognition. Use spaces as pattern seperators
  -c CONFIG_FILE [CONFIG_FILE ...], --config CONFIG_FILE [CONFIG_FILE ...]
                        Configuration file for API keys. Accepts keys from
                        Snusbase, WeLeakInfo, Leak-Lookup, HaveIBeenPwned,
                        Emailrep, Dehashed and hunterio
  -o OUTPUT_FILE, --output OUTPUT_FILE
                        File to write CSV output
  -j OUTPUT_JSON, --json OUTPUT_JSON
                        File to write JSON output
  -bc BC_PATH, --breachcomp BC_PATH
                        Path to the breachcompilation torrent folder. Uses the
                        query.sh script included in the torrent
  -sk, --skip-defaults  Skips Scylla and HunterIO check. Ideal for local scans
  -k CLI_APIKEYS [CLI_APIKEYS ...], --apikey CLI_APIKEYS [CLI_APIKEYS ...]
                        Pass config options. Supported format: "K=V,K=V"
  -lb LOCAL_BREACH_SRC [LOCAL_BREACH_SRC ...], --local-breach LOCAL_BREACH_SRC [LOCAL_BREACH_SRC ...]
                        Local cleartext breaches to scan for targets. Uses
                        multiprocesses, one separate process per file, on
                        separate worker pool by arguments. Supports file or
                        folder as input, and filepath globing
  -gz LOCAL_GZIP_SRC [LOCAL_GZIP_SRC ...], --gzip LOCAL_GZIP_SRC [LOCAL_GZIP_SRC ...]
                        Local tar.gz (gzip) compressed breaches to scans for
                        targets. Uses multiprocesses, one separate process per
                        file. Supports file or folder as input, and filepath
                        globing. Looks for 'gz' in filename
  -sf, --single-file    If breach contains big cleartext or tar.gz files, set
                        this flag to view the progress bar. Disables
                        concurrent file searching for stability
  -ch [CHASE_LIMIT], --chase [CHASE_LIMIT]
                        Add related emails from hunter.io to ongoing target
                        list. Define number of emails per target to chase.
                        Requires hunter.io private API key if used without
                        power-chase
  --power-chase         Add related emails from ALL API services to ongoing
                        target list. Use with --chase
  --hide                Only shows the first 4 characters of found passwords
                        to output. Ideal for demonstrations
  --debug               Print request debug information
  --gen-config, -g      Generates a configuration file template in the current
                        working directory & exits. Will overwrite existing
                        h8mail_config.ini file

🍊 Usage examples

Query for a single target
$ h8mail -t [email protected]
Query for list of targets, indicate config file for API keys, output to pwned_targets.csv
$ h8mail -t targets.txt -c config.ini -o pwned_targets.csv
Query a list of targets against local copy of the Breach Compilation, pass API key for Snusbase from the command line
$ h8mail -t targets.txt -bc ../Downloads/BreachCompilation/ -k "snusbase_token=$snusbase_token"
Query without making API calls against local copy of the Breach Compilation
$ h8mail -t targets.txt -bc ../Downloads/BreachCompilation/ -sk
Search every .gz file for targets found in targets.txt locally, skip default checks
$ h8mail -t targets.txt -gz /tmp/Collection1/ -sk
Check a cleartext dump for target. Add the next 10 related emails to targets to check. Read keys from CLI
$ h8mail -t [email protected] -lb /tmp/4k_Combo.txt -ch 10 -k "hunterio=ABCDE123"
Query username. Read keys from CLI
$ h8mail -t JSmith89 -q username -k "[email protected]" "dehashed_key=ABCDE123"
Query IP. Chase all related targets. Read keys from CLI
$ h8mail -t 42.202.0.42 -q ip -c h8mail_config_priv.ini -ch 2 --power-chase
Fetch URL content (CLI + file). Target all found emails
$ h8mail -u "https://pastebin.com/raw/kQ6WNKqY" "list_of_urls.txt"

🍊 Thanks & Credits

💜 h8mail can be found in:


🍊 Related open source projects


🍊 Notes

  • Service providers that wish being integrated can send me an email at k at khast3x dot club (PGP friendly)
  • h8mail is maintained on my free time. Feedback and war stories are welcomed.
  • Licence is BSD 3 clause
  • My code is signed with my Keybase PGP key. You can get it using:
# curl + gpg pro tip: import ktx's keys
curl https://keybase.io/ktx/pgp_keys.asc | gpg --import

# the Keybase app can push to gpg keychain, too
keybase pgp pull ktx

If you wish to stay updated on this project:

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].