Skip to main content

Open-source OSINT email intelligence tool

Project description

MailAccess Logo

MailAccess

License: MIT Python 3.11+ Docker

Self-hostable OSINT platform for investigating email addresses. Fan out across breach databases, social networks, DNS records, and the open web — get back a unified exposure score and structured findings you can export or pipe into Maltego.

Built for security researchers, OSINT analysts, and penetration testers operating under authorization. Read DISCLAIMER.md before use.

Install

CLI only (fastest)

pip install mailaccess
# or (recommended)
pipx install mailaccess

Full self-hosted stack

git clone https://github.com/YOUR_USERNAME/mailaccess
cd mailaccess
docker compose up -d

Usage

mailaccess investigate you@example.com
mailaccess investigate you@example.com --format json
mailaccess investigate you@example.com --modules hibp,gravatar,social
mailaccess history

Features

  • Concurrent module execution — all modules run in parallel, results stream as they arrive
  • WebSocket streaming — partial results arrive in real time without polling
  • REST API + web UI + CLI — use whatever interface fits your workflow
  • Plugin module system — drop a .py file in backend/modules/ and it auto-registers; no wiring required
  • 6 export formats: JSON, CSV, PDF, Markdown, STIX 2.1, Maltego XML
  • Maltego local transform server — run investigations directly from the Maltego desktop app
  • Webhook notifications — Slack, Discord, or any HTTP endpoint
  • Exposure score (0–100) with risk label: low / medium / high / critical
  • SQLite by default; PostgreSQL optional via Docker Compose profile

Quick Start

cp .env.example .env      # all API keys are optional
docker compose up         # backend :8000  ·  frontend :3000

Open http://localhost:3000 in your browser.

Modules

Module What it checks Requires key
hibp Known data breaches via the HIBP v3 API Yes — HIBP_API_KEY
emailrep Reputation score, risk flags, linked profiles (EmailRep.io) No (key optional)
gravatar Gravatar and Libravatar profile, linked accounts No
google_dork Google dork queries via SerpAPI — LinkedIn, GitHub, Pastebin, open web Yes — SERPAPI_KEY
domain_intel WHOIS, SPF / DMARC / MX, website presence, Shodan subdomains No (Shodan optional)
social Account existence on 13 platforms (GitHub, Discord, Spotify, Skype, and more) No
account_discovery Account probing across 120+ platforms via Holehe (opt-in) No
whatsmyname Username enumeration across 800+ platforms via WhatsMyName dataset (opt-in) No
hudson_rock Infostealer credential log lookup via Hudson Rock Cavalier API No
permutation_discovery Generates email permutations from recovered name, probes with HIBP + Hudson Rock (opt-in) No
ghunt Deep Google account intel: GAIA ID, YouTube, Maps reviews, Drive (Gmail only, opt-in) Yes — GHUNT_CREDS_PATH
dns_lookup MX, SPF, DMARC, DKIM DNS records No
whois_lookup WHOIS registration data No
shodan Hosts and open services for the email's domain Yes — SHODAN_API_KEY
social_links Social profiles inferred from the email username No
google_search Google search mentions of the email No

Export Formats

Format ?format= value Use case
JSON json Programmatic use, archiving
CSV csv Spreadsheet analysis
PDF pdf Human-readable reports
Markdown markdown Wikis, issue trackers
STIX 2.1 stix Threat intelligence platforms
Maltego XML maltego Maltego graph import

Integrations

Integration How
Maltego Local transform server at POST /maltego/email_investigate (no API key required)
Slack Set SLACK_WEBHOOK_URL in .env
Discord Set DISCORD_WEBHOOK_URL in .env
Generic webhook INTEGRATION_WEBHOOK_URL + optional INTEGRATION_WEBHOOK_SECRET (HMAC)

Documentation

Page Contents
Self-hosting Docker Compose, .env reference, PostgreSQL, proxy/Tor, Maltego setup
Module reference All modules, findings schema, adding new modules
API reference REST endpoints, WebSocket events, authentication
Export formats Supported formats, MIME types, filename conventions
Integrations Maltego, Slack, Discord, generic webhooks
Contributing Adding modules, adding exporters, code style, PR checklist

License

MIT. All data queried by MailAccess comes from public sources. See DISCLAIMER.md for authorized use cases and legal responsibility.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mailaccess-0.2.0.tar.gz (159.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mailaccess-0.2.0-py3-none-any.whl (79.1 kB view details)

Uploaded Python 3

File details

Details for the file mailaccess-0.2.0.tar.gz.

File metadata

  • Download URL: mailaccess-0.2.0.tar.gz
  • Upload date:
  • Size: 159.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.6

File hashes

Hashes for mailaccess-0.2.0.tar.gz
Algorithm Hash digest
SHA256 9b36d7ee12c367bcc4305146a14a920e62447e5e0344c1735f4db6f0b5fcad51
MD5 c3a00c83a9d1bc64c96d7891701977a4
BLAKE2b-256 c51df508069eba9edcdb2101aa779587bf76f4f9defbf714da45b6ec7aea54af

See more details on using hashes here.

File details

Details for the file mailaccess-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: mailaccess-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 79.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.6

File hashes

Hashes for mailaccess-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 4a75d337c5d6ac3c68a58429bac00096b7d7d4e1827a7c02be75591436ec81b9
MD5 9e20f2fc1d8c43aa9f70e41ceac8811f
BLAKE2b-256 ccc8762ee6c4580ad3d30ac35b3d3115e2e19bf313a17c533e76df673672baa3

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page