Skip to main content

Open-source OSINT email intelligence tool

Project description

███╗   ███╗ █████╗ ██╗██╗      █████╗  ██████╗ ██████╗███████╗███████╗███████╗
████╗ ████║██╔══██╗██║██║     ██╔══██╗██╔════╝██╔════╝██╔════╝██╔════╝██╔════╝
██╔████╔██║███████║██║██║     ███████║██║     ██║     █████╗  ███████╗███████╗
██║╚██╔╝██║██╔══██║██║██║     ██╔══██║██║     ██║     ██╔══╝  ╚════██║╚════██║
██║ ╚═╝ ██║██║  ██║██║███████╗██║  ██║╚██████╗╚██████╗███████╗███████║███████║
╚═╝     ╚═╝╚═╝  ╚═╝╚═╝╚══════╝╚═╝  ╚═╝ ╚═════╝ ╚═════╝╚══════╝╚══════╝╚══════╝

License: MIT Python 3.11+ Docker PyPI version PyPI Downloads

Self-hostable OSINT platform for investigating email addresses. Fan out across breach databases, social networks, DNS records, and the open web — get back a unified exposure score and structured findings you can export or pipe into Maltego.

Built for security researchers, OSINT analysts, and penetration testers operating under authorization. Read DISCLAIMER.md before use.

Install

CLI only (no Docker)

pip install mailaccess

# Option A: auto-start (simplest)
mailaccess investigate you@example.com
# Server starts automatically, runs investigation,
# stops when done.

# Option B: keep server running
mailaccess serve  # in one terminal
mailaccess investigate you@example.com  # in another

# Option C: full stack with Web UI
git clone https://github.com/YOUR_USERNAME/mailaccess
docker compose up -d

Quick Start

mailaccess investigate you@example.com
mailaccess investigate you@example.com -o report.pdf
mailaccess investigate you@example.com --format jsonl
mailaccess investigate -                        # read email from stdin
mailaccess serve                                # start backend server on :8000
mailaccess keys list
mailaccess keys set HIBP_API_KEY your-key-here
mailaccess modules
mailaccess doctor                               # coming soon

Investigation demo

What It Does

  • Identity graph — cross-platform correlation of accounts, usernames, and signals from each investigation
  • Phone number recovery — pipeline to surface and validate numbers tied to the target
  • Telegram / WhatsApp hints — lightweight messaging-app footprint checks alongside other modules
  • YAML-driven platform system — social-style checks defined in backend/platforms/; community extensible without new Python for each site
  • Concurrent module execution — all modules run in parallel, results stream as they arrive
  • WebSocket streaming — partial results arrive in real time without polling
  • REST API + web UI + CLI — use whatever interface fits your workflow
  • Plugin module system — drop a .py file in backend/modules/ and it auto-registers; no wiring required
  • 6 export formats: JSON, CSV, PDF, Markdown, STIX 2.1, Maltego XML
  • Maltego local transform server — run investigations directly from the Maltego desktop app
  • Webhook notifications — Slack, Discord, or any HTTP endpoint
  • Exposure score (0–100) with risk label: low / medium / high / critical
  • SQLite by default; PostgreSQL optional via Docker Compose profile

Modules

Module Coverage Key Required Opt-in
gravatar Profile hash lookup No No
hibp Breach check Yes No
emailrep Reputation + blacklist No No
hudson_rock Infostealer logs (free) No No
google_dork 5 automated dorks Yes (SerpAPI) No
domain_intel Domain + Shodan No (Shodan optional) No
dns_lookup MX/SPF/DMARC/DKIM/A/NS extraction No No
whois_lookup Domain WHOIS, privacy detection No No
social 13 platforms via YAML No No
social_links Username extraction, feeds pivot No No
account_discovery Holehe 120+ platforms No Yes
user_scanner 205+ platform vectors No Yes
whatsmyname 700+ platforms No Yes
breachdirectory 2nd breach source Yes No
username_pivot WMN via recovered usernames No Yes
permutation_discovery 60 email variants No Yes
phone_intel Phone validation + WA/TG hints No No
messaging_hints Telegram/WhatsApp username check No No
ghunt Gmail deep intel No (setup required) Yes
identity_graph Cross-platform cluster analysis No No (automatic)

800+ platforms checked when all opt-in modules enabled. YAML platform system — add new platforms via PR, no Python required.

Identity Graph

Every investigation generates a cross-platform identity graph linking accounts by shared usernames, photos, display names, and breach data. View at:

/investigation/:id/graph

Export as D3-compatible JSON via GET /api/report/{id}/graph or fetch clusters with confidence scores via GET /api/report/{id}/clusters.

Findings are automatically grouped into identity clusters with confidence scoring. Use --show-collisions to expand low-confidence matches in CLI output.

Pipeline

MailAccess is pipeline-friendly: read target emails from stdin, stream JSONL output, and branch on exit codes in CI/CD scripts.

# Batch from file
cat emails.txt | mailaccess investigate -

# Stream JSONL
mailaccess investigate you@example.com --format jsonl | jq .

# Filter critical findings
mailaccess investigate you@example.com --format jsonl | jq 'select(.severity=="critical")'

Exit codes: 0 clean · 1 findings · 2 breaches · 3 error

See docs/integrations.md for GitHub Actions examples.


Adding a Platform

No Python required. Drop a YAML file in backend/platforms/:

cp backend/platforms/TEMPLATE.yaml backend/platforms/mysite.yaml

Edit fields, submit PR.

See CONTRIBUTING.md for full guide.

Export Formats

Format ?format= value Use case
JSON json Programmatic use, archiving
CSV csv Spreadsheet analysis
PDF pdf Human-readable reports
Markdown markdown Wikis, issue trackers
STIX 2.1 stix Threat intelligence platforms
Maltego XML maltego Maltego graph import

Integrations

Integration How
Maltego Local transform server at POST /maltego/email_investigate (no API key required)
Slack Set SLACK_WEBHOOK_URL in .env
Discord Set DISCORD_WEBHOOK_URL in .env
Generic webhook INTEGRATION_WEBHOOK_URL + optional INTEGRATION_WEBHOOK_SECRET (HMAC)

Self-Hosting

cp .env.example .env      # all API keys are optional
docker compose up         # backend :8000  ·  frontend :3000

Open http://localhost:3000 in your browser. Full setup guide: docs/self-hosting.md.

CLI Reference

Command Description
mailaccess investigate <email> Run a full investigation against an email address
mailaccess investigate - Read target email from stdin
mailaccess serve Start the backend server on :8000
mailaccess history List past investigations
mailaccess keys list Show all configured API keys
mailaccess keys set <KEY> <value> Set an API key
mailaccess keys unset <KEY> Remove an API key
mailaccess config set-url <url> Point the CLI at a MailAccess instance
mailaccess modules List all available modules
mailaccess commands List all CLI commands
mailaccess doctor Check configuration and module health (coming soon)

The --output / -o flag on investigate saves the report to a file. The extension determines the format: .json, .csv, .pdf, .md, .stix.json, .maltego.csv.

API Keys

Key Module Where to get it Required?
HIBP_API_KEY hibp https://haveibeenpwned.com/API/Key Yes (module skips without it)
SERPAPI_KEY google_dork https://serpapi.com Yes (module skips without it)
SHODAN_API_KEY domain_intel https://account.shodan.io No
EMAILREP_API_KEY emailrep https://emailrep.io No
HUNTER_IO_API_KEY hunter_io https://hunter.io No
SLACK_WEBHOOK_URL Webhooks https://api.slack.com/messaging/webhooks No
DISCORD_WEBHOOK_URL Webhooks Discord server settings No

Troubleshooting

Troubleshooting demo

Links

Self-hosting guide Docker Compose, .env reference, PostgreSQL, proxy/Tor, Maltego setup
Module reference All modules, findings schema, adding new modules
API reference REST endpoints, WebSocket events, authentication
Export formats Supported formats, MIME types, filename conventions
Integrations Maltego, Slack, Discord, generic webhooks
Contributing Adding modules, adding exporters, code style, PR checklist
PyPI pip install mailaccess
GitHub Source code, issues, releases

License

MIT. All data queried by MailAccess comes from public sources. See DISCLAIMER.md for authorized use cases and legal responsibility.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mailaccess-0.3.8.tar.gz (16.7 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mailaccess-0.3.8-py3-none-any.whl (118.6 kB view details)

Uploaded Python 3

File details

Details for the file mailaccess-0.3.8.tar.gz.

File metadata

  • Download URL: mailaccess-0.3.8.tar.gz
  • Upload date:
  • Size: 16.7 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.6

File hashes

Hashes for mailaccess-0.3.8.tar.gz
Algorithm Hash digest
SHA256 1762ddd60f67b128ce1fdebc3414ead447dd8f124a91757847b304fcfd5b014d
MD5 5cc7b89e8ce42aef439e096cadee8c64
BLAKE2b-256 c372bfc22f25d61bd7dbddaacd84dc89e249cc86c9e63c6123dc93d7a9ed3576

See more details on using hashes here.

File details

Details for the file mailaccess-0.3.8-py3-none-any.whl.

File metadata

  • Download URL: mailaccess-0.3.8-py3-none-any.whl
  • Upload date:
  • Size: 118.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.6

File hashes

Hashes for mailaccess-0.3.8-py3-none-any.whl
Algorithm Hash digest
SHA256 ad4f40dac981734382a30f40ac9ffbbfa46eafcba9edf4071864654fdf2a509c
MD5 ab6686895666f0e0f154926c745b741a
BLAKE2b-256 3aae066882d41a867d4c152ee296b5b0beca4f85efd91780996333d0ff4ccc49

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page