-
Notifications
You must be signed in to change notification settings - Fork 522
Targeting Beyond Email
This section covers search operators with h8mail's custom queries. You can specify your data type with the custom query option -q
or --custom-query
.
Using search operators greatly expands the amount of data you can correlate.
Adding API keys significantly increases h8mail's power, so be sure to use them
You can specify your data type with the custom query option -q
or --custom-query
. This tells h8mail to skip email pattern recognition when targeting (similar to --loose
).
Custom queries are used when querying remote providers.
When looking for custom data from local file searching, use the --loose
option instead.
Searching for the username 'jsmith99' using default scylla.sh API:
$ h8mail -t jsmith99 -q username
Searching for hashs from a file (one per line), with additional API keys from the h8mail configuration file:
$ h8mail -t my_hashs.txt -q hash -c h8mail_config.ini
Searching for all breached emails for a domain name:
$ h8mail -t fcorp.com -q domain
h8mail can perform lookups on various data types.
This includes:
- email (default)
- username
- hash
- ip
- domain
- password
By default, h8mail will search for emails, using hunter.io and scylla.sh.
Some API providers may support additional fields. Check the API Wiki page for a full list.