h8mail 2.3 has been released. In this blog post, we’ll be having an overview of all the new features.
Click here to read previous h8mail v2 release post.

Table of Content


  • If you installed h8mail using pip, simply use
$ pip3 install --upgrade h8mail

Use --user at the end if getting a permission message from pip

  • If you installed h8mail using the setup.py file, remove h8mail with
$ pip3 uninstall h8mail

And re-install it by cloning the repository and running the following inside the folder

$ python3 setup.py install

Add --user if getting a permission message.


  • Added HIBP v3
  • Switch to emailrep.io as default for breach checks, since haveibeenpwned has discontinued their free tier API.
  • Implemented username & password & ip search for all API providers
  • Implemented hash, domain search
  • Check if running latest version
  • Fix breachcomp separator issues
  • Generate template config file in CWD (gen-config)
  • Added more related emails from API services
  • Rewrote chasing (recursive)
  • Added ‘power-chasing’ for additional related emails targeting (related emails found using WeLeakInfo, Snusbase or Leak-Lookup)
  • Added –debug output

h8mail 2.3 features

Search Operators Summary

username domain hash password ip
WeLeakInfo yes yes yes yes yes
LeakLookup yes yes yes yes
Snusbase yes yes yes yes

Generate a blank configuration file

You can now generate a blank configuration file to add your API keys. It will have all available fields commented using ;.
Simply use --gen-config or -g. It will generate a configuration file called h8mail_config.ini in the current working directory & exit.

Be careful as it will overwrite existing h8mail_config.ini file. To remove a comment, remove the ; at the beginning of the file.

HaveIBeenPwned v3

Troy Hunt has announced that starting on the 18/08/2019, HIBP will only support authenticated requests.

You can purchase your API key here.

Once you have your API key, add it to the hibp line, and uncomment the line.

Pass the configuration file using -c h8mail_config.ini

h8mail will be relying on emailrep.io’s free API to identify breaches for emails.

Debug output

To dump incoming and outgoing requests, simply add --debug to your command.

New search queries

This was probably the most requested feature since h8mail v2 release. View the table to see which provider supports what.
You can now use the following keywords with -q to tell h8mail what to query:

  • username
  • password
  • ip
  • hash
  • domain


  • to search for all breaches for the username bob.smith:
$ h8mail -t bob.smith -q username -c h8mail_config.ini
  • to search for all breaches for the ip, output to CSV:
$ h8mail -t -q ip -c h8mail_config.ini -o results.csv

(links contain refs)
You can purchase API keys for:


Since h8mail now supports broader queries (such as domain) you can use breach services to add related emails to target, instead of relying on hunter.io only.

This is activated by adding --power-chase to a chasing h8mail command:

$ h8mail -t evilcorp.com -q domain -c h8mail_config.ini -ch 2 --power-chase


Hope y’all have fun and do good deeds.