h8mail 2.3 has been released. In this blog post, we’ll be having an overview of all the new features.
Click here to read previous h8mail v2 release post.
Table of Content
- Table of Content
- h8mail 2.3 features - Search Operators Summary
- If you installed h8mail using
pip, simply use
$ pip3 install --upgrade h8mail
--user at the end if getting a permission message from pip
- If you installed h8mail using the
setup.pyfile, remove h8mail with
$ pip3 uninstall h8mail
And re-install it by cloning the repository and running the following inside the folder
$ python3 setup.py install
--user if getting a permission message.
- Added HIBP v3
- Switch to emailrep.io as default for breach checks, since haveibeenpwned has discontinued their free tier API.
- Implemented username & password & ip search for all API providers
- Implemented hash, domain search
- Check if running latest version
- Fix breachcomp separator issues
- Generate template config file in CWD (
- Added more related emails from API services
- Rewrote chasing (recursive)
- Added ‘power-chasing’ for additional related emails targeting (related emails found using WeLeakInfo, Snusbase or Leak-Lookup)
- Added –debug output
h8mail 2.3 features
Search Operators Summary
Generate a blank configuration file
You can now generate a blank configuration file to add your API keys. It will have all available fields commented using
-g. It will generate a configuration file called
h8mail_config.ini in the current working directory & exit.
Be careful as it will overwrite existing
To remove a comment, remove the
; at the beginning of the file.
Troy Hunt has announced that starting on the 18/08/2019, HIBP will only support authenticated requests.
You can purchase your API key here.
Once you have your API key, add it to the
hibp line, and uncomment the line.
Pass the configuration file using
h8mail will be relying on emailrep.io’s free API to identify breaches for emails.
To dump incoming and outgoing requests, simply add
--debug to your command.
New search queries
This was probably the most requested feature since h8mail v2 release. View the table to see which provider supports what.
You can now use the following keywords with
-q to tell h8mail what to query:
- to search for all breaches for the username bob.smith:
$ h8mail -t bob.smith -q username -c h8mail_config.ini
- to search for all breaches for the ip 188.8.131.52, output to CSV:
$ h8mail -t 184.108.40.206 -q ip -c h8mail_config.ini -o results.csv
(links contain refs)
You can purchase API keys for:
Since h8mail now supports broader queries (such as
domain) you can use breach services to add related emails to target, instead of relying on
This is activated by adding
--power-chase to a chasing h8mail command:
$ h8mail -t evilcorp.com -q domain -c h8mail_config.ini -ch 2 --power-chase
Hope y’all have fun and do good deeds.