Search

Hunting Emails and Breached Data

DeHashed API Tool by Heath

(programming with AI created this)

How to use:

Basic usage (query for a username):

./dehashed_parser.py -u username

Output Unique Results to CSV:

python3 dehashed_parser.py -e email@example.com -o results.csv

Will return all results for the queried email address and store it to a csv

Output passwords only:

dehashed_parser.py -e @example.com --only-passwords

This will return all the passwords for the queried domain, sorted alphabetically by the field query. Example results:

email: bob@example.com, password: Bobert123!
email: mike@example.com, password: 2813308004
You have 40 API credits remaining

Search for a domain passwords:

python3 dehashed_parser.py -e @example.com --only-passwords

Find something juicy then use the email for search:

python3 dehashed_parser.py -e email@example.com

Search the username found from emails:

python3 dehashed_parser.py -u username

If unique password, find where else it was used:

python3 dehashed_parser.py -p password