Giter Site home page Giter Site logo

khast3x / h8mail Goto Github PK

View Code? Open in Web Editor NEW
3.9K 124.0 496.0 3.49 MB

Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email

License: Other

Python 98.26% Dockerfile 0.16% Makefile 1.58%
osint email kali theharvester password leak hibp haveibeenpwned breach breach-compilation

h8mail's Introduction

platforms PyPI version PyPI - Python Version Downloads travis
Docker Pulls
h8mail is an email OSINT and breach hunting tool using different breach and reconnaissance services, or local breaches such as Troy Hunt's "Collection1" and the infamous "Breach Compilation" torrent.



πŸ“– Table of Content


🍊 Features

  • πŸ”Ž Email pattern matching (reg exp), useful for reading from other tool outputs
  • 🌍 Pass URLs to directly find and target emails in pages
  • πŸ’« Loosey patterns for local searchs ("john.smith", "evilcorp")
  • πŸ“¦ Painless install. Available through pip, only requires requests
  • βœ… Bulk file-reading for targeting
  • πŸ“ Output to CSV file or JSON
  • πŸ’ͺ Compatible with the "Breach Compilation" torrent scripts
  • 🏠 Search cleartext and compressed .gz files locally using multiprocessing
    • πŸŒ€ Compatible with "Collection#1"
  • πŸ”₯ Get related emails
  • 🐲 Chase related emails by adding them to the ongoing search
  • πŸ‘‘ Supports premium lookup services for advanced users
  • 🏭 Custom query premium APIs. Supports username, hash, ip, domain and password and more
  • πŸ“š Regroup breach results for all targets and methods
  • πŸ‘€ Includes option to hide passwords for demonstrations
  • 🌈 Delicious colors

πŸ“¦ pip3 install h8mail


APIs

Service Functions Status
HaveIBeenPwned(v3) Number of email breaches βœ… πŸ”‘
HaveIBeenPwned Pastes(v3) URLs of text files mentioning targets βœ… πŸ”‘
Hunter.io - Public Number of related emails βœ…
Hunter.io - Service (free tier) Cleartext related emails, Chasing βœ… πŸ”‘
Snusbase - Service Cleartext passwords, hashs and salts, usernames, IPs - Fast ⚑ βœ… πŸ”‘
Leak-Lookup - Public Number of search-able breach results βœ… (πŸ”‘)
Leak-Lookup - Service Cleartext passwords, hashs and salts, usernames, IPs, domain βœ… πŸ”‘
Emailrep.io - Service (free) Last seen in breaches, social media profiles βœ… πŸ”‘
scylla.so - Service (free) Cleartext passwords, hashs and salts, usernames, IPs, domain 🚧
Dehashed.com - Service Cleartext passwords, hashs and salts, usernames, IPs, domain βœ… πŸ”‘
IntelX.io - Service (free trial) Cleartext passwords, hashs and salts, usernames, IPs, domain, Bitcoin Wallets, IBAN βœ… πŸ”‘
πŸ†• Breachdirectory.org - Service (free) Cleartext passwords, hashs and salts, usernames, domain 🚧 πŸ”‘

πŸ”‘ - API key required


🍊 Usage

usage: h8mail [-h] [-t USER_TARGETS [USER_TARGETS ...]]
              [-u USER_URLS [USER_URLS ...]] [-q USER_QUERY] [--loose]
              [-c CONFIG_FILE [CONFIG_FILE ...]] [-o OUTPUT_FILE]
              [-j OUTPUT_JSON] [-bc BC_PATH] [-sk]
              [-k CLI_APIKEYS [CLI_APIKEYS ...]]
              [-lb LOCAL_BREACH_SRC [LOCAL_BREACH_SRC ...]]
              [-gz LOCAL_GZIP_SRC [LOCAL_GZIP_SRC ...]] [-sf]
              [-ch [CHASE_LIMIT]] [--power-chase] [--hide] [--debug]
              [--gen-config]

Email information and password lookup tool

optional arguments:
  -h, --help            show this help message and exit
  -t USER_TARGETS [USER_TARGETS ...], --targets USER_TARGETS [USER_TARGETS ...]
                        Either string inputs or files. Supports email pattern
                        matching from input or file, filepath globing and
                        multiple arguments
  -u USER_URLS [USER_URLS ...], --url USER_URLS [USER_URLS ...]
                        Either string inputs or files. Supports URL pattern
                        matching from input or file, filepath globing and
                        multiple arguments. Parse URLs page for emails.
                        Requires http:// or https:// in URL.
  -q USER_QUERY, --custom-query USER_QUERY
                        Perform a custom query. Supports username, password,
                        ip, hash, domain. Performs an implicit "loose" search
                        when searching locally
  --loose               Allow loose search by disabling email pattern
                        recognition. Use spaces as pattern seperators
  -c CONFIG_FILE [CONFIG_FILE ...], --config CONFIG_FILE [CONFIG_FILE ...]
                        Configuration file for API keys. Accepts keys from
                        Snusbase, WeLeakInfo, Leak-Lookup, HaveIBeenPwned,
                        Emailrep, Dehashed and hunterio
  -o OUTPUT_FILE, --output OUTPUT_FILE
                        File to write CSV output
  -j OUTPUT_JSON, --json OUTPUT_JSON
                        File to write JSON output
  -bc BC_PATH, --breachcomp BC_PATH
                        Path to the breachcompilation torrent folder. Uses the
                        query.sh script included in the torrent
  -sk, --skip-defaults  Skips Scylla and HunterIO check. Ideal for local scans
  -k CLI_APIKEYS [CLI_APIKEYS ...], --apikey CLI_APIKEYS [CLI_APIKEYS ...]
                        Pass config options. Supported format: "K=V,K=V"
  -lb LOCAL_BREACH_SRC [LOCAL_BREACH_SRC ...], --local-breach LOCAL_BREACH_SRC [LOCAL_BREACH_SRC ...]
                        Local cleartext breaches to scan for targets. Uses
                        multiprocesses, one separate process per file, on
                        separate worker pool by arguments. Supports file or
                        folder as input, and filepath globing
  -gz LOCAL_GZIP_SRC [LOCAL_GZIP_SRC ...], --gzip LOCAL_GZIP_SRC [LOCAL_GZIP_SRC ...]
                        Local tar.gz (gzip) compressed breaches to scans for
                        targets. Uses multiprocesses, one separate process per
                        file. Supports file or folder as input, and filepath
                        globing. Looks for 'gz' in filename
  -sf, --single-file    If breach contains big cleartext or tar.gz files, set
                        this flag to view the progress bar. Disables
                        concurrent file searching for stability
  -ch [CHASE_LIMIT], --chase [CHASE_LIMIT]
                        Add related emails from hunter.io to ongoing target
                        list. Define number of emails per target to chase.
                        Requires hunter.io private API key if used without
                        power-chase
  --power-chase         Add related emails from ALL API services to ongoing
                        target list. Use with --chase
  --hide                Only shows the first 4 characters of found passwords
                        to output. Ideal for demonstrations
  --debug               Print request debug information
  --gen-config, -g      Generates a configuration file template in the current
                        working directory & exits. Will overwrite existing
                        h8mail_config.ini file

🍊 Usage examples

Query for a single target
$ h8mail -t [email protected]
Query for list of targets, indicate config file for API keys, output to pwned_targets.csv
$ h8mail -t targets.txt -c config.ini -o pwned_targets.csv
Query a list of targets against local copy of the Breach Compilation, pass API key for Snusbase from the command line
$ h8mail -t targets.txt -bc ../Downloads/BreachCompilation/ -k "snusbase_token=$snusbase_token"
Query without making API calls against local copy of the Breach Compilation
$ h8mail -t targets.txt -bc ../Downloads/BreachCompilation/ -sk
Search every .gz file for targets found in targets.txt locally, skip default checks
$ h8mail -t targets.txt -gz /tmp/Collection1/ -sk
Check a cleartext dump for target. Add the next 10 related emails to targets to check. Read keys from CLI
$ h8mail -t [email protected] -lb /tmp/4k_Combo.txt -ch 10 -k "hunterio=ABCDE123"
Query username. Read keys from CLI
$ h8mail -t JSmith89 -q username -k "[email protected]" "dehashed_key=ABCDE123"
Query IP. Chase all related targets. Read keys from CLI
$ h8mail -t 42.202.0.42 -q ip -c h8mail_config_priv.ini -ch 2 --power-chase
Fetch URL content (CLI + file). Target all found emails
$ h8mail -u "https://pastebin.com/raw/kQ6WNKqY" "list_of_urls.txt"

🍊 Thanks & Credits

πŸ’œ h8mail can be found in:


🍊 Related open source projects


🍊 Notes

  • Service providers that wish being integrated can send me an email at k at khast3x dot club (PGP friendly)
  • h8mail is maintained on my free time. Feedback and war stories are welcomed.
  • Licence is BSD 3 clause
  • My code is signed with my Keybase PGP key. You can get it using:
# curl + gpg pro tip: import ktx's keys
curl https://keybase.io/ktx/pgp_keys.asc | gpg --import

# the Keybase app can push to gpg keychain, too
keybase pgp pull ktx

If you wish to stay updated on this project:

h8mail's People

Contributors

adivinaelnombre avatar cclauss avatar khast3x avatar noraj avatar shifoc avatar v1a0 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

h8mail's Issues

Feature request

Hello not sure I’m placing this in the right location I am new to github and how all this works so sorry if this is all wrong. I had a couple request or ideas and was hoping to see if it’s possible

  1. Incorporating the ability to search for a username not just email

  2. Preset config for setting location of breach compilation folder so the directory and flag doesn’t have to be inputted each time.

Thanks again

Ph33rz(Chris )

H8mail returning breached but no password/hash

  • h8mail version: Latest
  • Python version: 3.8.2
  • Operating System: Kali Linux

Description

I attempted to get the results for a email address I knew was involved in a breach and to get provided with the hash/clear text password. When it finished it returned saying that the email was involved in a breach but did not return with the hash/password.

What I Did

H8mail -t <Target email>

After the installation the h8mail.py file is not parsed.

  • h8mail version:2.5
  • Python version:Python 2.7.16 / Python 3.7.6
  • Operating System: Linux 4.19.0-kali4-amd64 #1 SMP Debian 4.19.28-2kali1

Description

Hello khast3x

I hope that you are well, I just wanted to see if you could guide me a little in regards to a situation in which after I complete the install process I dont find the h8mail.py file, I have downloaded the package using the zip download and also using "git clone".

What I Did

I reviewed multiple information sites including looking for instructions about the install process including following the instructions given on this site without any successful solution.

``
oot@HCKA223:/.25/search#
root@HCKA223:
/.25/search# cd h8mail/
root@HCKA223:/.25/search/h8mail# ls
Dockerfile h8mail LICENSE Makefile PyPi.rst README.md setup.py tests
root@HCKA223:
/.25/search/h8mail#
root@HCKA223:~/.25/search/h8mail# cat README.md

Collecting h8mail
Downloading https://files.pythonhosted.org/packages/55/8f/574301e40762f344c0b687b9b9e17f085260b8cb0d415f2466cf70065a87/h8mail-2.5.tar.gz
Complete output from command python setup.py egg_info:
Traceback (most recent call last):
File "", line 1, in
File "/tmp/pip-install-hloLaX/h8mail/setup.py", line 12, in
with open("PyPi.rst") as readme_file:
IOError: [Errno 2] No such file or directory: 'PyPi.rst'

root@HCKA223:/.25/search/h8mail# pip install -r requirements.txt
Requirement already satisfied: requests in /usr/lib/python2.7/dist-packages (from -r requirements.txt (line 1)) (2.21.0)
root@HCKA223:
/.25/search/h8mail#
root@HCKA223:/.25/search/h8mail#
root@HCKA223:
/.25/search/h8mail#
root@HCKA223:/.25/search/h8mail# pip3 install h8mail
Requirement already satisfied: h8mail in /usr/local/lib/python3.7/dist-packages/h8mail-2.5-py3.7.egg (2.5)
Requirement already satisfied: requests in /usr/lib/python3/dist-packages (from h8mail) (2.21.0)
root@HCKA223:
/.25/search/h8mail#

root@HCKA223:~/.25/search/h8mail# python3 setup.py install
running install
running bdist_egg
running egg_info
....
arching for requests==2.21.0
Best match: requests 2.21.0
Adding requests 2.21.0 to easy-install.pth file
Using /usr/lib/python3/dist-packages
Finished processing dependencies for h8mail==2.5

root@HCKA223:/.25/search/h8mail#
root@HCKA223:
/.25/search/h8mail# ls
build dist Dockerfile h8mail h8mail.egg-info LICENSE Makefile PyPi.rst README.md setup.py tests
root@HCKA223:/.25/search/h8mail#
root@HCKA223:
/.25/search/h8mail#


i will really appreciate if you could give me hand about this question, it may be something simple but unfortunately I have not been able to find a solution.

Thank you for your time.

Future release features

Ideas for future release:

  • Check larger types of inputs with API services

    • username
    • hash
    • wildcard
  • Check if running latest version of h8mail

    • perform/suggest update if not
  • HTML report

loose search of a target file

  • h8mail version: Version 2.3 - "SEASON_PRIMER"
  • Python version: Python 3.7.4
  • Operating System: Kali

Description

I tryd to check a list of nicknames that saved in a textfile (.txt)

What I Did

h8mail -t targets.txt --loose
 but h8mail uses the filename as a target itself

`[>] h8mail is up to date
[>] Targets:
['targets.txt']
[~] Removing duplicates
[~] Target factory started for targets.txt
[~] HIBP free tier will stop working on the 2019/08/18
[~] You can already use a purchased API key using h8mail (config file)
[!] Could not contact HIBP for targets.txt
401
[!] hunter.io (pubic API) error: targets.txt
list index out of range
[!] Could not contact emailrep for targets.txt`

but i canΒ΄t drop the "--loose" command because the file contains no email adresses

what am i doing wrong?
thanks for help in advance!

be more robust for errors in the database

At some rare places instead of a : the database entries are seperated by a ; which throws things of

I have replaced

t.breachcomp_passw.append(line.split(":")[1])
with
t.breachcomp_passw.append(re.split("[;:]",line)[-1])
for me to make it work.

Error: Request could not be made

Hello, I am getting an error when running python3 h8mail.py -t [email protected].

Error: Request could not be made for [email protected] HTTPSConnectionPool(host='haveibeenpwned.com', port=443): Max retries exceeded with url: /api/v2/breachedaccount/[email protected]?truncateResponse=true (Caused by NewConnectionError('<urllib3.connection.VerifiedHTTPSConnection object at 0x7f80a83d7780>: Failed to establish a new connection: [Errno -2] Name or service not known')) Traceback (most recent call last): File "h8mail.py", line 230, in <module> main(args) File "h8mail.py", line 200, in main breached_targets = target_factory(targets, api_keys) File "h8mail.py", line 146, in target_factory current_target.get_hibp() File "/root/h8mail/classes.py", line 75, in get_hibp response = self.make_request(url) File "/root/h8mail/classes.py", line 48, in make_request if response.status_code == 429: UnboundLocalError: local variable 'response' referenced before assignment

image

issue with H8mail

  • h8mail version:2.5
  • Python version:3
  • Operating System:Parrot

Description

I followed the instructions to the T but it still isnt working? it says the following errors below.

user@parrot]─[~/h8mail]
└──╼ $pip install -r requirements.tx
Could not open requirements file: [Errno 2] No such file or directory: 'requirements.tx'
β”Œβ”€[βœ—]─[user@parrot]─[~/h8mail]
└──╼ $python h8mail.py -h
python: can't open file 'h8mail.py': [Errno 2] No such file or directory
β”Œβ”€[βœ—]─[user@parrot]─[~/h8mail]
└──╼ $pip install -r requirements.txt
Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt'
β”Œβ”€[βœ—]─[user@parrot]─[~/h8mail]
└──╼ $python3 h8mail.py -h
python3: can't open file 'h8mail.py': [Errno 2] No such file or directory
β”Œβ”€[βœ—]─[user@parrot]─[~/h8mail]
└──╼ $

 here.

Not able to execute h8mail on Mac running Mojave 10.14.6

When trying to install h8mail using pip3 install h8mail, it confirms but does not execute.

β•°β”€βž€ pip3 install h8mail
Requirement already satisfied: h8mail in /Library/Frameworks/Python.framework/Versions/3.6/lib/python3.6/site-packages/h8mail-2.1.1-py3.6.egg (2.1.1)
Requirement already satisfied: requests in /Library/Frameworks/Python.framework/Versions/3.6/lib/python3.6/site-packages (from h8mail) (2.21.0)
Requirement already satisfied: chardet<3.1.0,>=3.0.2 in /Library/Frameworks/Python.framework/Versions/3.6/lib/python3.6/site-packages (from requests->h8mail) (3.0.4)
Requirement already satisfied: idna<2.9,>=2.5 in /Library/Frameworks/Python.framework/Versions/3.6/lib/python3.6/site-packages (from requests->h8mail) (2.8)
Requirement already satisfied: certifi>=2017.4.17 in /Library/Frameworks/Python.framework/Versions/3.6/lib/python3.6/site-packages (from requests->h8mail) (2017.4.17)
Requirement already satisfied: urllib3<1.25,>=1.21.1 in /Library/Frameworks/Python.framework/Versions/3.6/lib/python3.6/site-packages (from requests->h8mail) (1.24.1)
╭─sumgr0@MacBook-Pro ~
β•°β”€βž€ h8mail
zsh: command not found: h8mail

When cloning and git repo and running the python setup.py install command, results in below error:
β•°β”€βž€ sudo python setup.py install 1 ↡
/System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/distutils/dist.py:267: UserWarning: Unknown distribution option: 'python_requires'
warnings.warn(msg)
Traceback (most recent call last):
File "setup.py", line 46, in
zip_safe=False,
File "/System/Library/Frameworks/Python.framework/Versions/2.7/lib/python2.7/distutils/core.py", line 111, in setup
_setup_distribution = dist = klass(attrs)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/setuptools/dist.py", line 268, in init
self.fetch_build_eggs(attrs['setup_requires'])
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/setuptools/dist.py", line 313, in fetch_build_eggs
replace_conflicting=True,
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/pkg_resources/init.py", line 843, in resolve
dist = best[req.key] = env.best_match(req, ws, installer)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/pkg_resources/init.py", line 1088, in best_match
return self.obtain(req, installer)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/pkg_resources/init.py", line 1100, in obtain
return installer(requirement)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/setuptools/dist.py", line 380, in fetch_build_egg
return cmd.easy_install(req)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/setuptools/command/easy_install.py", line 638, in easy_install
return self.install_item(spec, dist.location, tmpdir, deps)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/setuptools/command/easy_install.py", line 668, in install_item
dists = self.install_eggs(spec, download, tmpdir)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/setuptools/command/easy_install.py", line 851, in install_eggs
return self.build_and_install(setup_script, setup_base)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/setuptools/command/easy_install.py", line 1079, in build_and_install
self.run_setup(setup_script, setup_base, args)
File "/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/setuptools/command/easy_install.py", line 1067, in run_setup
raise DistutilsError("Setup script exited with %s" % (v.args[0],))
distutils.errors.DistutilsError: Setup script exited with error in urllib3 setup command: 'extras_require' must be a dictionary whose values are strings or lists of strings containing valid project/version requirement specifiers.

ui error

thanks for the tool but i have this error

Traceback (most recent call last):
File "h8mail.py", line 228, in
ui.setup(verbose=args.verbosity) # Show debug messages if -v True
AttributeError: module 'ui' has no attribute 'setup'

Even after deleting the piece of code the same is executed

Hi @khast3x

Looking for your kind help. I am trying to modify the DEHASHED section in classes.py in my local copy. As i have stated in my previous issue #62 that requests.get is not returning anything in case of Dehash, hence i tried to check the same in another way.

I have commented the make_request call from get_dehashed fucntion. But still o improvement. Then i have executed in debug and saw, the old method is getting called.

Am i missing anything? Is there anywhere else i need to change/ update anything to get my new chunk of code working?

Earnestly looking for your help at the earliest please.

Regards

'ui' has no attribute 'setup'

The script runs fine, up until I actually ask it to search the emails. Which it gives this error:

Traceback (most recent call last): File "h8mail.py", line 228, in <module> ui.setup(verbose=args.verbosity) # Show debug messages if -v True AttributeError: module 'ui' has no attribute 'setup'

Quick note as well, not the same issue as the "No module named ui" incidents with issue 11.

will it show the breached passwords?

  • h8mail version: 2.4.1
  • Python version: python 2 & 3
  • Operating System: Linux

Description

Describe what you were trying to get done.
Tell us what happened, what went wrong, and what you expected to happen.

What I Did

python3 -m h8mail -t [email protected] -c config.ini

[>] Showing results for [email protected]
LEAKLOOKUP_PUB |[email protected] > myfitnesspal.com
LEAKLOOKUP_PUB |[email protected] > netlog.com
LEAKLOOKUP_PUB |[email protected] > jobstreet.com


                               Session Recap:  


             Target                  |                   Status                  

   [email protected]         |          Breach Found (3 elements)      

am i able to see the passwords for these breached sites?

Dehashed - junk data returns each time along with the valid results

  • h8mail version:latest
  • Python version:
  • Operating System:Linux

Description

I configured the API keys for the dehashed.com service, and it all works well, but each time I make a query(any, email or domain) it returns a bunch of junk data(1000+) along with some valid results at the beginning.

no module named ui

hi,
i installed h8mail with pip3 (because pip didnt work) and when i launch the program it says:

Traceback (most recent call last):
File "h8mail.py", line 4, in
import ui
ImportError: No module named ui

Getting syntax error on newest version

  • h8mail version: 2.5
  • Python version: 3.5.2
  • Operating System: Ubuntu 16.04

Description

Trying to execute a command like, h8mail -h, did not work properly. I'm not sure if this error is really anything significant but I'm unfamiliar with Python so I decided to ask.

What I Did

Created a virtual environment venv on user home folder using

virtualenv -p /usr/bin/python3 venv
then went in there doing
cd venv
source bin/activate
pip3 install h8mail
h8mail -h

This was the response

Traceback (most recent call last):
File "/home/matt/venv/bin/h8mail", line 5, in
from h8mail.main import main
File "/home/matt/venv/lib/python3.5/site-packages/h8mail/main.py", line 2, in
from .utils.run import main
File "/home/matt/venv/lib/python3.5/site-packages/h8mail/utils/run.py", line 10, in
from .breachcompilation import breachcomp_check
File "/home/matt/venv/lib/python3.5/site-packages/h8mail/utils/breachcompilation.py", line 18
c.info_news(f"Looking up {t.target} in BreachCompilation")
^
SyntaxError: invalid syntax

Error when executing the -gz flag.

While executing the -gz flag with h8mail to scan the Collection#1 gzip file, it shows the results (may not be complete) and then always ends up with following error:

[!] Something went wrong with gzip worker
Compressed file ended before the end-of-stream marker was reached


[>] Showing results for

[~] No results founds


                               Session Recap:  


             Target                  |                   Status                  

          <redacted>               |               Not Compromised              

Execution time (seconds): 4769.6074821949005

Done

Config.ini

How to configure config.ini? I didn't understand how this part works

Question - Weleakinfo hash/wild search

Hi mate, awesome project! Thank you so much for coming up with this.

Wondering if you will be willing to accept anything else rather than an e-mail as target. From time to time, we search for hash, domain, name, company name etc...

Would you be looking into it ?

Cheers

"expecting value: line 1 column 1 (char 0)" error

  • h8mail version: latest
  • Python version: latest
  • Operating System: kali

Description

When using h8mail i get this message on multiple api service requests.

"expecting value: line 1 column 1 (char 0)"

What I Did

Googled til the cows came home.

[WinError 193] %1 is not a valid Win32 application

  • h8mail version: 2.2
  • Python version: Python 3.7.1
  • Operating System: Windows 10

Whenever I execute the following command I get a WinError 193

h8mail.exe -t [email protected] -bc D:\BC\BreachCompilation

[>] Targets:
[email protected]
[] Removing duplicates
[
] Target factory started for [email protected]
[!] Could not contact HIBP for [email protected]
403
[>] Found 0 related emails for [email protected] using Hunter.IO
[>] Found additional data with emailrep.io
[~] Looking up [email protected] in BreachCompilation
[!] Breach compilation
[WinError 193] %1 is not a valid Win32 application

False negative

  • h8mail version: 2.2
  • Python version: 3.x
  • Operating System: macOS

Description

False negatives while doing compressed file searching

What I Did

Obviously I use whatbreach to get my databases (because i'm cool like that ;p). Anyways [email protected] has been breached in one of Adobe's breaches, this file is a tar.gz that decompressed to a gz file that decompresses to a file named cred while using h8mail to search through the file it will not provide any information, but it will show that there are occurrences if i use -lb.

h8mail -t [email protected] -gz Adobe\ 152M.tar -sk --loose
 	h8mail is free & open-source. Please report scammers.

 
	   Version 2.2 - "HAILTEAM"  
  
	._____. ._____.     ;____________;
	| ._. | | ._. |     ;   h8mail   ;
	| !_| |_|_|_! |     ;------------;
	!___| |_______!  Heartfelt Email OSINT
	.___|_|_| |___.    Use responsibly!
	| ._____| |_. | ;____________________;
	| !_! | | !_! | ; github.com/khast3x ;
	!_____! !_____! ;--------------------;
	 
[>] Targets:
['[email protected]']
[~] Removing duplicates
[~] Target factory started for [email protected]
[~] Terminating worker pool

 __________________________________________________________________________________________
 
[>] Showing results for [email protected]

[~] No results founds
__________________________________________________________________________________________



                                   Session Recap:  


                 Target                  |                   Status                  
__________________________________________________________________________________________

       [email protected]         |               Not Compromised              
__________________________________________________________________________________________

Execution time (seconds):   0.1438760757446289  
h8mail -t [email protected] -lb cred 
 	h8mail is free & open-source. Please report scammers.

 
	   Version 2.2 - "HAILTEAM"  
  
	._____. ._____.     ;____________;
	| ._. | | ._. |     ;   h8mail   ;
	| !_| |_|_|_! |     ;------------;
	!___| |_______!  Heartfelt Email OSINT
	.___|_|_| |___.    Use responsibly!
	| ._____| |_. | ;____________________;
	| !_! | | !_! | ; github.com/khast3x ;
	!_____! !_____! ;--------------------;
	 
[>] Targets:
[email protected] 
[~] Removing duplicates
[~] Target factory started for [email protected]
[{'Name': 'Adobe'}, {'Name': 'OnlinerSpambot'}, {'Name': 'RiverCityMedia'}, {'Name': 'VerificationsIO'}]
[>] Found 4 breaches for [email protected] using HIBP
[~] No pastes found for [email protected] using HIBP PASTE
[>] Found 0 related emails for [email protected] using Hunter.IO
[~] Using file cred
[~] Worker [96175] is searching for targets in cred (3481316319 bytes)
[>] Found occurrence [cred] Line 436679: 111285261-|--|[email protected]|-FP220B6GQV8=-|-Munsters|--
^C[!] Caught KeyboardInterrupt, terminating workers

 __________________________________________________________________________________________
 
[>] Showing results for [email protected]
HIBP           |[email protected] > Adobe
HIBP           |[email protected] > OnlinerSpambot
HIBP           |[email protected] > RiverCityMedia
HIBP           |[email protected] > VerificationsIO
__________________________________________________________________________________________



                                   Session Recap:  


                 Target                  |                   Status                  
__________________________________________________________________________________________

       [email protected]         |          Breach Found (4 elements)         
__________________________________________________________________________________________

Execution time (seconds):   31.479928970336914  

Error on local data

  • h8mail version: 2.2.1
  • Python version: 3.6
  • Operating System: Parrot OS

Description

I installed with pip3

I am trying to run a batch of emails through the local data
h8mail -t '/home/username/Documents/Target.txt' -bc '/home/username/Documents/BreachCompilation' --local

h8mail: error: argument -lb/--local-breach: expected at least one argument

h8mail unable to launch

when ever i manage to launch h8mail using the command h8mail or even h8mail -h
i get this following error
Traceback (most recent call last): File "/usr/local/bin/h8mail", line 11, in <module> load_entry_point('h8mail==2.3', 'console_scripts', 'h8mail')() File "/usr/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 489, in load_entry_point return get_distribution(dist).load_entry_point(group, name) File "/usr/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 2852, in load_entry_point return ep.load() File "/usr/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 2443, in load return self.resolve() File "/usr/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 2449, in resolve module = __import__(self.module_name, fromlist=['__name__'], level=0) File "/usr/local/lib/python2.7/dist-packages/h8mail-2.3-py2.7.egg/h8mail/__main__.py", line 2, in <module> from .utils.run import main File "/usr/local/lib/python2.7/dist-packages/h8mail-2.3-py2.7.egg/h8mail/utils/run.py", line 10, in <module> from .breachcompilation import breachcomp_check File "/usr/local/lib/python2.7/dist-packages/h8mail-2.3-py2.7.egg/h8mail/utils/breachcompilation.py", line 18 c.info_news(f"Looking up {t.target} in BreachCompilation") ^ SyntaxError: invalid syntax

h8mail- "not compromised"- while searching on target

  • h8mail version:2.4.1
  • Python version: both 2.7.17 and 3.7.4
  • Operating System: Kali

Description

IΒ΄m new at this, and aparrently h8mail is running well (not explicit errors during install nor execution) but i have some questions.

i did find 3 security breaches using haveibeenpwned on targets mail
but h8mail dont find anything, it says "not compromised"

i think im missing the whole point of this wonderful tool.

thank you, haunter

What I Did

if i use another accounts that i find on internet in some h8mail tutorials and they did retrive results!!

WeLeakInfo is back!

  • h8mail version: Version 2.5 - "ROCKSROCKSMASSON"
  • Python version: 3.7
  • Operating System: Kali 2020.1

Description

WeLeakInfo.to is the replacement to weleakinfo.com, any chance you can update the call?

Facing some troubles against the local test

Great effort and work on the tool wish you all the best ! @khast3x
As the title claims,
I've been testing around with the normal lookup It's working great, however without showing passwords for obvious reasons, just breaches sources. I couldn't get the services with api to work because they charge money for their API's as i noticed.
So, I downloaded the breachcompilation to actually go ahead and test it, I got the txt sorted and went ahead to test. I got these errors:
Warning: Breach compilation [Errno 2] No such file or directory: '/root/h8mail/BreachCompilation/query.sh': '/root/h8mail/BreachCompilation/query.sh'

Seems like the query.sh is missing so i got a query from here: https://gist.github.com/nlitsme/6f138e72b328c28520d64d7e03f2d5f9

Later on, after several testings I ran this command as explained:
python h8mail.py -t targets.txt -bc ../Downloads/BreachCompilation/ --local
I got false breached signals with no passwords shown.

I know im missing something, will be glad if someone is able to point it out!

Cheers

Hi

Just wanted to tell you <3

How do i add multiple api keys?

  • h8mail version: lastest
  • Python version: 3
  • Operating System: windows 10 / Microsoft store variant

Description

I'm currently working on getting a emailed.io api key and a scylla key, how do I add both api keys into the program? Also will the limit on emailrep.io be resolved along with the scylla issue?

API Keys issue

seems HIBP API Keys changed/stopped working..

[] HIBP free tier will stop working on the 2019/08/18
[
] You can already use a purchased API key using h8mail (config file)
[!] Could not contact HIBP for [email protected]
401

No output written to CSV output file

  • h8mail version: Version 2.5 - "ROCKSROCKSMASSON"
  • Python version: Python 3.6.9
  • Operating System: Ubuntu 18.04 (same issue on Mac OS X)

Description

I want to write an output file (-o flag).

What I Did

h8mail -sk --local-breach dumps/non-gz/ --gzip dumps/gz/ -o example.csv -q domain -t example.com

Xnip2020-03-18_10-33-40

As you can see, no actual output is written even when there are results found.

Can't open h8mail.py and HIBP not working for me

Hello,
I'm having two issues..

The first one is regarding h8mail.py
Whenever I run the commands:

apt-get install nodejs
git clone https://github.com/khast3x/h8mail.git
cd h8mail
pip3 install -r requirements.txt
python3 h8mail.py -h

It says the following:

python3: can't open file 'h8mail.py': [Errno 2] No such file or directory

The second one: regarding HIBP
Whenever I run the command:

h8mail -t [[email protected]]

It says the following in one of the lines:

[!] Could not contact HIBP for [[email protected]]
403

Any advice as to how to solve these two issues would be much appreciated.

It doesn't search anymore on scylla

  • h8mail version: 2.5
  • Python version: 3.7.6
  • Operating System: Kali

Description

I launched a scan with an email that I have previously tried.
The first time H8mail checked in scylla.sh without a prior configuration, the second time that I tried with the same email It hasn't checked in scylla but only in emailrep.

What I Did

I tried to remove the software and to install it another time and to run the software by using other email with the same results.

The command that I ran:

     `h8mail -t <email>`

Could not contact HIBP

  • h8mail version: 2.3
  • Python version: Python 3.7.4
  • Operating System: Kali Linux

Description

I am running a single target against a user name,

What I Did

h8mail -t <email_address>
[>] Targets:
<email_address>
[] Removing duplicates
[
] Target factory started for <email_address>
[] HIBP free tier will stop working on the 2019/08/18
[
] You can already use a purchased API key using h8mail (config file)
[!] Could not contact HIBP for <email_address> 401

Unfortunately I do not know why there is a 401 error, it does tell me that there are breachs found (13 elements) but with no information, as see in your screen shots when you run the command.

You advise for this n00b using your tool would be awesome.

refractor target_factory

Directly send user_args, and retrieve API keys from their. Use the object to correctly interpret user input regarding services to query

Cant get h8mail to show cleartext passwords

  • h8mail version: the latest
  • Python version: 3
  • Operating System: windows 10 / ubuntu Microsoft store variant

Description

Trying to find my own accounts passwords and although breaches have been detected I cant actually see the clear text password to confirm that is not a false positive.

What I Did

I ran python3 -m h8mail -t [email protected] -o Desktop

Program was like: found a breach. writing to CSV output. but no output or password was outputted? Please help.

Breach Compilation list index out of range for a specific email

Hello! I noticed after messing around using theharvester to get emails and then using h8mail to check them for breaches using the breach compilation (I'm not doing anything illegal, I promise), that the email "[email protected]" caused a list index out of range crash. Now I know it's not someone's real email, but it caused the entire list check to fail.

I'm not too familiar with python, but I found changing line 178 in h8mail.py from "if line:" to "if ":" in line" fixed it from what I can tell, so maybe it's a good solution, or maybe it causes other things to go wrong that I'm not aware of.

DeHash API... Help please

  • h8mail version: 2.5 "ROCKSROCKSMASSON"
  • Python version: 3.7.7
  • Operating System: Kali Linux 2020.1

Description

How do i make get my dehash API to work? i have inserted my "dehash_key" in h8mail_config.ini. what do i insert in "dehash_email" ? and how do i run it with the API?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.