Tool Overview: h8mail

Banner for Tools Posts

h8mail is an open-source intelligence (OSINT) and password breach hunting tool written in Python. It is designed to help security professionals identify if specific email addresses have been compromised in data breaches. By aggregating data from multiple leak-checking services and local databases, h8mail provides a centralized way to audit credential exposure for individuals or entire organizations.

Core Functionality

The tool operates by querying two primary types of data locations:

  • Remote APIs: h8mail can connect to numerous breach-tracking services. Notable integrations include Have I Been Pwned, Hunter.io, Snusbase, DeHashed, and Leak-Lookup. While some services provide basic info for free, many require API keys for full data retrieval.
  • Local Archives: One of h8mail’s distinct features is its ability to search through local files. This includes massive, historical data dumps such as “Collection #1” or the “Breach Compilation.” It supports searching through cleartext files and compressed .gz archives using multiprocessing to maintain speed.

Practical Application for Security Professionals

For those entering the IT security field, h8mail is a practical utility for assessing “credential stuffing” risks. This is a common attack where hackers use leaked passwords from one site to attempt access on another.  Key use cases include:

  1. Incident Response: When an employee reports a suspicious login, h8mail can quickly check if their corporate email and a known password were part of a recent public leak.
  2. Security Auditing: IT teams can run bulk searches (using a text file of employee emails) to identify which users are most at risk and require mandatory password resets or enhanced multi-factor authentication (MFA).
  3. Red Teaming: During authorized security testing, h8mail helps simulate how an attacker might discover valid credentials without ever touching the target’s actual infrastructure.

How it Operates

h8mail is a command-line tool. A user typically provides an email address or a list of emails as a target. The tool then cross-references these targets against the enabled APIs or local directories.  The output is presented in a clear, categorized format that shows the name of the breach, the date it occurred, and—depending on the service used—the specific data leaked (e.g., passwords, hints, or IP addresses). For privacy and demonstration purposes, the tool includes a “hide” flag that obscures all but the first few characters of discovered passwords.

Conclusion

h8mail serves as a high-efficiency aggregator for breach data. For new professionals, it simplifies the complex task of manual breach hunting, turning a time-consuming research process into a single, automated command. It is a vital tool for understanding an organization’s exposure in the wider landscape of leaked credentials.

Citations and Further Reading