ANAVEM
Languagefr
H4X-Tools terminal interface showing OSINT toolkit menu
Open SourceOpen SourcePython

H4X-Tools

H4X-Tools is a comprehensive Python-based OSINT and reconnaissance toolkit featuring 16 specialized modules for information gathering, social media scraping, and network analysis. Built for security professionals and penetration testers working on Linux and Windows systems.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
17 March 2026 12 min 631 0
631 Stars PythonOpen Source 12 min
Introduction

Overview

What is H4X-Tools?

H4X-Tools is a modular, terminal-based toolkit designed for Open Source Intelligence (OSINT), reconnaissance, and data scraping operations. Created by developer vil in April 2022, this Python-based suite has grown into a comprehensive collection of 16 specialized tools that security professionals, penetration testers, and researchers use for information gathering and reconnaissance activities.

The toolkit operates entirely from the command line and provides a unified interface for various OSINT operations, from social media scraping to network scanning. With over 630 stars on GitHub and active development through early 2026, H4X-Tools has established itself as a practical solution for security professionals who need reliable, scriptable tools for their reconnaissance workflows.

Getting Started

H4X-Tools requires Python 3.10 or higher and Git for installation. The setup process is straightforward across both supported platforms:

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is PKI? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is Cybersecurity? Definition, How It Works & Use Cases

Related: What is Penetration Testing? Definition, Process & Best

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is PKI? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is Cybersecurity? Definition, How It Works & Use Cases

Related: What is Penetration Testing? Definition, Process & Best

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is PKI? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is Hashing? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is Cybersecurity? Definition, How It Works & Use Cases

Related: What is Penetration Testing? Definition, Process & Best

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is PKI? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is Cybersecurity? Definition, How It Works & Use Cases

Related: What is Penetration Testing? Definition, Process & Best

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is OAuth? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is Cybersecurity? Definition, How It Works & Use Cases

Related: What is Penetration Testing? Definition, Process & Best

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is Cybersecurity? Definition, How It Works & Use Cases

Related: What is Penetration Testing? Definition, Process & Best

Related: What is Phishing? Definition, How It Works & Prevention

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is Man-in-the-Middle? Definition, How It Works &

Related: What is DDoS? Definition, How It Works & Use Cases

Related: What is Zero-Day? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is Man-in-the-Middle? Definition, How It Works &

Related: What is DDoS? Definition, How It Works & Use Cases

Related: What is Zero-Day? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is Man-in-the-Middle? Definition, How It Works &

Related: What is DDoS? Definition, How It Works & Use Cases

Related: What is Zero-Day? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is Man-in-the-Middle? Definition, How It Works &

Related: What is DDoS? Definition, How It Works & Use Cases

Related: What is Zero-Day? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is JWT? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is SSL Certificate? Definition, How It Works & Use

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Single Sign-On? Definition, How It Works & Use Cases

Related: What is Endpoint Detection? Definition, How It Works & Use

Related: What is Patch Management? Definition, Process & Best

Related: What is Penetration Testing? Definition, Process & Best

Related: What is SOC? Definition, How It Works & Use Cases

Related: What is SIEM? Definition, How It Works & Use Cases

Related: What is CCTV? Definition, How It Works & Use Cases

Related: What is Man-in-the-Middle? Definition, How It Works &

Related: What is PKI? Definition, How It Works & Use Cases

Related: What is OAuth? Definition, How It Works & Use Cases

Related: What is LDAP? Definition, How It Works & Use Cases

Related: What is Hashing? Definition, How It Works & Use Cases

Related: What is Encryption? Definition, How It Works & Use Cases

Related: What is Zero Trust? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is Cybersecurity? Definition, How It Works & Use Cases

Related: What is SSL Certificate? Definition, How It Works & Use

Related: What is PKI? Definition, How It Works & Use Cases

Related: What is a Firewall? Definition, How It Works & Use Cases

Related: What is TLS? Definition, How It Works & Use Cases

Related: What is CCTV? Definition, How It Works & Use Cases

Related: What is DDoS? Definition, How It Works & Use Cases

Related: What is Man-in-the-Middle? Definition, How It Works &

Related: What is Encryption? Definition, How It Works & Use Cases

Related: What is Hashing? Definition, How It Works & Use Cases

Related: What is Patch Management? Definition, Process & Best

Linux Installation:

git clone https://github.com/vil/h4x-tools.git
cd h4x-tools
sh setup.sh

Windows Installation:

git clone https://github.com/vil/h4x-tools.git
cd h4x-tools
setup.bat

The setup scripts automatically install all required dependencies and offer the option to build a standalone executable using PyInstaller. For manual dependency installation:

pip install -r requirements.txt

Once installed, launch the toolkit with:

python h4xtools.py
Tip: Use the --debug flag for verbose output during troubleshooting: python h4xtools.py --debug

Usage & Practical Examples

H4X-Tools provides a menu-driven interface that makes it accessible even for users new to OSINT tools. Here are some practical usage scenarios:

Social Media Intelligence Gathering:

The Instagram scraper offers two operational modes. Guest mode provides basic public profile information without requiring authentication, while authenticated mode (using an Instagram sessionid cookie) accesses richer data through Instagram's private mobile API. This includes business account flags, IGTV content counts, and publicly listed contact information.

Comprehensive Web Reconnaissance:

The web reconnaissance module supports seven distinct search modes, each optimized for specific intelligence gathering objectives. The Person mode employs 12 specialized search dorks, while the Email mode uses 8 targeted queries. Domain reconnaissance utilizes 12 specific dorks designed to uncover infrastructure details, and the Username mode searches across 12 different platforms.

Breach and Credential Intelligence:

The leak search functionality queries multiple data sources simultaneously. For email addresses, it cross-references the Hudson Rock Cavalier database for stealer-log records and the ProxyNova COMB dataset containing over 3.2 billion leaked credential entries. Results include compromise dates, stealer malware families, and masked credential samples.

Note: Always ensure you have proper authorization before conducting reconnaissance activities against any target systems or accounts.

Performance & Capabilities

H4X-Tools demonstrates solid performance characteristics across its various modules. The port scanner utilizes a 50-thread concurrent pool for efficient network scanning, while the username search tool performs asynchronous checks across hundreds of websites simultaneously. The web scraping module can recursively crawl discovered pages, and the directory buster performs asynchronous bruteforce operations against target websites.

The toolkit's modular architecture allows each tool to operate independently while sharing common libraries and export functionality. This design ensures that resource-intensive operations like large-scale username searches or recursive web crawling don't impact other toolkit functions.

Export capabilities support multiple formats (TXT, CSV, JSON) with results automatically organized in the scraped_data directory, making it easy to integrate findings into larger security assessments or reports.

Who Should Use H4X-Tools?

H4X-Tools is primarily designed for security professionals, penetration testers, and researchers who need comprehensive OSINT capabilities in a single toolkit. It's particularly valuable for:

  • Penetration testers conducting reconnaissance phases of security assessments
  • Security researchers investigating threats or analyzing digital footprints
  • Digital forensics investigators gathering intelligence on subjects or infrastructure
  • Bug bounty hunters performing initial target reconnaissance
  • Cybersecurity students learning OSINT techniques and methodologies

The toolkit assumes users have legitimate authorization for their reconnaissance activities and understand the legal and ethical implications of information gathering operations.

Verdict

H4X-Tools delivers a solid, comprehensive OSINT toolkit that consolidates many essential reconnaissance functions into a single, well-organized package. Its modular design, cross-platform compatibility, and active development make it a practical choice for security professionals who need reliable tools for information gathering operations. While it may not replace specialized tools for specific use cases, it provides excellent value as a unified reconnaissance platform for most OSINT workflows.

Capabilities

Key Features

  • Instagram OSINT Scraper: Dual-mode scraping with guest and authenticated access for comprehensive social media intelligence
  • Multi-Mode Web Reconnaissance: Seven specialized search modes including person, email, domain, and username investigations
  • Phone Number Analysis: Validation, carrier lookup, and social media registration checking
  • IP and Domain Intelligence: Geolocation lookup, WHOIS queries, and hostname resolution
  • Username Search: Asynchronous checking across hundreds of websites and platforms
  • Email Investigation: Registration verification across 100+ services using holehe
  • Breach Intelligence: Multi-source credential leak detection with 3.2B+ record coverage
  • Network Scanning: Concurrent TCP port scanning and Wi-Fi network discovery
  • Web Scraping: Recursive link harvesting and directory bruteforcing
  • System Enumeration: Local user discovery and Bluetooth device scanning
  • Data Export: TXT, CSV, and JSON export formats for all results
  • Cross-Platform: Native support for Linux and Windows environments
Setup

Installation

Prerequisites

Requires Python 3.10+ and Git

Linux

git clone https://github.com/vil/h4x-tools.git
cd h4x-tools
sh setup.sh

Windows

git clone https://github.com/vil/h4x-tools.git
cd h4x-tools
setup.bat

Manual Installation

pip install -r requirements.txt
python h4xtools.py

Docker Alternative

No official Docker image available - manual installation required

How to Use

Usage Guide

Basic Usage

python h4xtools.py

Debug Mode

python h4xtools.py --debug

Example Operations

Instagram OSINT

Select tool #1 from menu, choose guest or authenticated mode, enter target username

Web Reconnaissance

Select tool #2, choose from 7 search modes (General, Person, Email, Domain, Username, Phone, Custom Dork)

Port Scanning

Select tool #8, enter target IP/hostname and port range (e.g., 1-1000)

Export Results

Most tools offer export options to scraped_data/ directory in TXT, CSV, or JSON formats

Tip: Always ensure proper authorization before conducting reconnaissance activities
Evaluation

Pros & Cons

Pros
  • Comprehensive 16-module OSINT toolkit in one package
  • Cross-platform compatibility (Linux and Windows)
  • Multiple export formats (TXT, CSV, JSON)
  • Active development with recent 2026 updates
  • Modular design allows selective tool usage
  • Asynchronous operations for improved performance
  • Built-in wordlists and databases included
  • Well-documented setup process
Cons
  • GPL-3.0 license may limit commercial use
  • Requires Instagram credentials for full social media features
  • External API dependencies with potential rate limits
  • Limited Windows support for some modules
  • No built-in proxy or anonymization features
  • Documentation lacks detailed usage examples
  • Potential legal and ethical considerations for some use cases
Other Options

Alternatives

theHarvester

Established OSINT tool for email, subdomain, and host gathering from public sources

Learn More

Maltego

Commercial OSINT platform with graphical interface and extensive data integrations

Learn More

Recon-ng

Modular reconnaissance framework with Metasploit-like structure for advanced users

Learn More

SpiderFoot

Automated OSINT collection tool with web interface for streamlined investigations

Learn More

Frequently Asked Questions

Is H4X-Tools free to use?+
Yes, H4X-Tools is completely free and open source under the GPL-3.0 license, though this license may restrict commercial use in some organizations.
How does H4X-Tools compare to other OSINT frameworks?+
H4X-Tools offers 16 specialized modules in one package with cross-platform support, making it more comprehensive than tools like theHarvester but less complex than commercial platforms like Maltego.
What platforms does H4X-Tools support?+
H4X-Tools runs natively on Linux and Windows systems, requiring Python 3.10 or higher. Some features like Bluetooth scanning have limited Windows support.
Can I use H4X-Tools for professional security assessments?+
Yes, H4X-Tools is suitable for professional penetration testing and security assessments, provided you have proper authorization for reconnaissance activities against target systems.
How active is H4X-Tools development?+
Development is active with the most recent updates pushed in February 2026. The project has over 630 stars and continues to receive regular maintenance and feature updates.
References

Official Resources (3)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Further Intelligence

Deepen your knowledge with related resources

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...