h8mail: Breach Data Search
Jake Creps find: If breach data is a regular part of your workflow, you have to have h8mail on your radar. This multitool leverages multiple services, paid and free, to streamline your workflow with breach data or email OSINT. Simply plug in your paid or free APIs into this tool and begin hunting. Why is breach data valuable? Breach data can allow you to see beyond the surface in any investigation. If you suspect your subject has an alias account, a sock puppet, or uses an alternate variation of their name across the web, leveraging breach data can shed light on a digital record that may not be obvious on the surface. A unique password from an email address you've already verified, when reversed, may lead you to another email address you weren't already aware of. Reversing that new email address into your existing workflow can identify new data points that could potentially create a new lead in a dead investigation. h8mail makes this process easy by allowing you to perpetually loop between new data points found through breach data while also giving you the ability to verify information using tools like Hunter. I caught this tool early on and it's come so far since it's original version. The developer is also very receptive to feedback.