Skip to content

Targeting Beyond Email

ktx edited this page Jul 3, 2020 · 2 revisions

This section covers search operators with h8mail's custom queries. You can specify your data type with the custom query option -q or --custom-query.

Using search operators greatly expands the amount of data you can correlate.
Adding API keys significantly increases h8mail's power, so be sure to use them

Using custom queries

You can specify your data type with the custom query option -q or --custom-query. This tells h8mail to skip email pattern recognition when targeting (similar to --loose).

Custom queries are used when querying remote providers.
When looking for custom data from local file searching, use the --loose option instead.

Searching for the username 'jsmith99' using default scylla.sh API:

$ h8mail -t jsmith99 -q username

Searching for hashs from a file (one per line), with additional API keys from the h8mail configuration file:

$ h8mail -t my_hashs.txt -q hash -c h8mail_config.ini

Searching for all breached emails for a domain name:

$ h8mail -t fcorp.com -q domain

Available data to query

h8mail can perform lookups on various data types.
This includes:

  • email (default)
  • username
  • hash
  • ip
  • domain
  • password

By default, h8mail will search for emails, using hunter.io and scylla.sh.

Some API providers may support additional fields. Check the API Wiki page for a full list.

Clone this wiki locally