Holehe

Holehe

Holehe is an open source tool used to check if email addresses have been compromised in data breaches. It searches through publicly available data breach databases to see if the entered email address appears exposed in any breaches.
Holehe image
email privacy security breach-checking

Holehe: Check Email Compromise

Open source tool to check if email addresses have been compromised in data breaches, searching through publicly available data breach databases.

What is Holehe?

Holehe is an open source command line tool used to check if email addresses or domains have been compromised in known data breaches. It searches through public databases of breached data, compiled from various leaked password dumps and data breaches over the years.

To use Holehe, you enter an email address or domain name as input. Behind the scenes, it searches through databases like HIBP, BreachCompilation, and more. If the email address is found in any leaks, Holehe will output details on the breaches, including source, date, and number of compromised accounts. This helps you know if any credentials associated with that address may be exposed.

As an open source tool, Holehe is freely available to use. It runs on Python and works across Windows, Mac, and Linux. Key features include checking individual email addresses, entire domains, speed optimized searching, and data from over 10 billion leaked credentials. Overall it serves as a handy way to monitor if your own accounts have been caught up in major data breaches.

Holehe Features

Features

  1. Checks if email addresses have been compromised in data breaches
  2. Searches through publicly available breach databases
  3. Open source and can be used locally without sending data to external servers
  4. Works offline once databases are downloaded
  5. Fast searching algorithm
  6. Actively maintained and updated with new breaches

Pricing

  • Open Source

Pros

Free and open source

Does not send email addresses to external servers for checking

Easy to use with clear CLI or web interface

Keeps databases updated with latest breaches

Very fast search compared to web services

Can be run locally for privacy

Cons

Requires some technical skill to setup initially

Must keep local databases updated manually

Only checks email addresses, not other account info

CLI interface not as user friendly as a web app

Limited to searching breach databases, not preventing breaches


The Best Holehe Alternatives

Top Security & Privacy and Password Management and other similar apps like Holehe


Epieos icon

Epieos

Epieos is an open-source workplace analytics platform designed to provide organizations with valuable insights into how their teams communicate and collaborate. It captures communication and work activity across multiple channels, including email, calendars, instant messaging, code repositories, and more.Once integrated with these systems, Epieos applies advanced analytics techniques such as...
Epieos image
OSINT Industries icon

OSINT Industries

OSINT Industries is an open-source intelligence software designed to help gather and analyze publicly available data for investigations, research, and more. It includes various tools and techniques to search the internet, social media, public records, and other open online sources to uncover information.Some key features of OSINT Industries include:Powerful search...
OSINT Industries image
PrivacyWatch.app icon

PrivacyWatch.app

PrivacyWatch.app is an application designed specifically for macOS to monitor access requests to sensitive components like the webcam, microphone, and location services. It runs quietly in the background and requires no configuration.When PrivacyWatch detects an attempt by an application to access the webcam or microphone that hasn't been explicitly authorized...
PrivacyWatch.app image
GHunt icon

GHunt

GHunt is an open source OSINT (open-source intelligence) tool used to find related usernames based on an initial seed username or identifier across over 40 social networks like Twitter, Instagram and GitHub, plus data breaches. It works by searching user profiles on various sites to find matches in attributes like...
GHunt image
Ignorant icon

Ignorant

Ignorant is an open-source virtual personal assistant software application designed to help users be more organized and productive. It has capabilities such as the ability to set reminders, take notes, manage tasks/to-do lists, and more through natural language voice or text interactions.Some key features of Ignorant include:Natural language processing to...
Ignorant image
Prying Deep icon

Prying Deep

Prying Deep is an open-source forensic analysis and reverse engineering tool specifically designed for Android applications (APKs). It enables security testers, researchers, and Android developers to statically analyze Android packages to gain a deep understanding of what's happening under the hood.Some key features and capabilities of Prying Deep include:Decompiling and...
Prying Deep image
Cylect.io icon

Cylect.io

Cylect.io is a versatile no-code automation platform designed to empower users to build automated workflows and bots without any coding knowledge. With its intuitive drag-and-drop interface, anyone can piece together complex process automations in a matter of minutes.Some key features of Cylect.io include:Visual workflow builder - Piece together your workflow...
Cylect.io image