https://github.com/balestek/hashtray
hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an email address using a Gravatar account username or hash.
https://github.com/balestek/hashtray
gravatar hash information-gathering investigation md5 md5-hash open-source-intelligence osint osint-gravatar osint-python osint-tool osint-tools pip pipenv pipx python
Last synced: about 1 month ago
JSON representation
hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an email address using a Gravatar account username or hash.
- Host: GitHub
- URL: https://github.com/balestek/hashtray
- Owner: balestek
- License: gpl-3.0
- Created: 2024-04-23T00:55:59.000Z (about 1 year ago)
- Default Branch: master
- Last Pushed: 2024-12-01T15:09:50.000Z (6 months ago)
- Last Synced: 2025-03-15T16:47:13.443Z (2 months ago)
- Topics: gravatar, hash, information-gathering, investigation, md5, md5-hash, open-source-intelligence, osint, osint-gravatar, osint-python, osint-tool, osint-tools, pip, pipenv, pipx, python
- Language: Python
- Homepage:
- Size: 995 KB
- Stars: 45
- Watchers: 1
- Forks: 6
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# hashtray
![]()
[](https://badge.fury.io/py/hashtray)

[](https://pepy.tech/project/hashtray)
[](https://github.com/psf/black)
[](https://github.com//medor/blob/master/LICENSE)## Intro
_hashtray_ is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate an email address using a Gravatar account username or hash. A Gravatar account can provide substantial information for pivoting purposes.## Features
_hashtray_ comes with the following features:
+ [X] Find a Gravatar account using an email address
+ [x] Locate the primary email associated with a Gravatar account using a Gravatar username or hash
+ [x] Display Gravatar account informationIf the profile is public and the information available, the following can be retrieved:
- Hash
- Profile URL
- Avatar
- Activity (Last profile edit)
- Location
- Preferred username
- Pronunciation
- Display name
- Given name
- Family name
- Pronouns
- Bio (About)
- Job title
- Company
- Contact information
- Emails
- Phone numbers
- Verified accounts (Instagram, Twitter, Facebook, TikTok,...)
- Payment information (PayPal, Venmo,...)
- Wallets (Bitcoin, Ethereum,...)
- Photos
- Interests (Links)## Installation
Python 3.8+ is required.
### pipx (recommended)
```bash
pipx install hashtray
```### pipenv
```bash
pipenv install hashtray
```### pip
```bash
pip install hashtray
```## Usage
### Find Gravatar account with an email
![]()
Pretty straightforward. The command is `email` .
It converts the email address into its MD5 hash. _hashtray_ then checks if a public profile associated with the hash exists on Gravatar. If found, it displays the profile information.
```bash
hashtray email [email protected]
```In some cases, the email hash may not match the one found on the Gravatar profile, yet a profile is still displayed. This is because Gravatar profiles only show the hash of the primary email address. Consequently, the email address used for the search is not the primary one but is registered as a secondary email. This indicates that there is at least one more email address associated with the Gravatar account to be found.
In such cases, _hashtray_ alerts you. You can then attempt to find the primary email address using its second command, `account`.
### Find an email from a Gravatar username or hash
![]()
To find an email address associated with a Gravatar username or hash, use the account command.
hashtray creates a list of possible email addresses using data from the Gravatar profile.
Both the username and hash can be used with the account command. The username is the last part of the Gravatar profile page URL (e.g., https://gravatar.com/username), while the hash is the MD5 hash of the Gravatar account email.
If you come across a Gravatar avatar, you can find its MD5 hash within the avatar's URL, which follows this pattern: https://1.gravatar.com/avatar/437e4dc6d001f2519bc9e7a6b6412923. This hash represents the account hash.
It compares each of these email hashes to the account hash to locate the primary Gravatar account email.
Additionally, it also checks emails in the public profile to see if they are the primary email.
```bash
hashtray account username # with username
hashtray account 437e4dc6d001f2519bc9e7a6b6412923 # with the hash
```#### Options
##### --domain_list
`--domain_list` or `-l` to choose the domain list to use:
- `common` : 455 domains (default)
- `long` : 5334 domains
- `full` : 118062 domainsThe domains lists need to be refined in the future.
```bash
hashtray account jondo --domain_list long
hashtray account 437e4dc6d001f2519bc9e7a6b6412923 -l long
```##### --elements
`--elements` or `-e` to manually provide strings for email generation instead of relying on the built-in logic. The more strings you add, the longer the hash generation process will take. Please refer to the notes for more information.
```bash
hashtray account jondo --elements john doe j d jondo 2001
hashtray account 437e4dc6d001f2519bc9e7a6b6412923 -e john doe j d jondo 2001
```##### --domains
`--domains` or `-d` to use custom email domains instead of the built-in domain lists. This allows you to tailor the search to specific domains relevant to your investigation.
```bash
hashtray account jondo --custom_domains domain1.com domain2.com
hashtray account 437e4dc6d001f2519bc9e7a6b6412923 -c domain1.com domain2.com
```##### --crazy
`--crazy` or `-c` to go crazy and try EVERY SINGLE combination (with any special character at any place in the combinations). See Notes.
```bash
hashtray account jondo --custom_domains domain1.com domain2.com
hashtray account 437e4dc6d001f2519bc9e7a6b6412923 -c domain1.com domain2.com
```#### Notes
_hashtray_ retrieves emails in two ways:
- extracting emails from the profile page, if it's available and public, and verifying if they are the emails linked to the account.
- generating potential email addresses from the available information and comparing their MD5 hashes to the account hash.For the latter, it uses several elements if available:
- the username chunk of the profile page URL
- the preferred username
- the given name and the family name, as well as their initials
- the display name
- the verified accounts URL usernames chunksThe elements list is then deduplicated, and elements that can be combined from already present elements are discarded.
All possible combinations, including a few special characters (._-) and a domain list, are generated, without any repetitive element and with a unique special character per combination.
The more elements to combine, the longer the processing time will be. To give you an idea of the scale, here's a table showing the number of combinations for a single domain and 455 domains, based on different numbers of elements, for the normal mode (one unique special character allowed per combination):
| elements | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
|-------------|-----|------|-------|------|--------|------|-------|--------|------|-------|
| 1 domain | 1 | 10 | 51 | 244 | 1.2k | 7.8k | 54.7k | 438.3k | 3.9M | 39.5M |
| 455 domains | 455 | 4.5k | 23.2k | 111k | 584.6k | 3.5M | 24.9M | 199.4M | 1.7B | 17.9B |Here is the same table for the crazy mode `--crazy`, `-c` (any special characters allowed at any place per combination):
| elements | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
|-------------|-----|------|-----|-------|-------|------|-------|------|-------|--------|
| 1 domain | 1 | 10 | 123 | 1.97k | 39.4k | 947k | 26.5M | 848M | 30.5B | 1.22T |
| 455 domains | 455 | 4.5k | 56k | 897k | 17.9M | 431M | 12.1B | 386B | 13.9T | 556T |### Next steps for future versions
- [ ] Improve the domain lists (better ranking by users) and add a "small" one.
- [ ] Add an intermediate mode between normal and crazy for "" and any special character at any place.
- [ ] Add multi-processing### Contributions
Suggestions and contributions are welcomed, especially for the "Next steps" section tasks.
### Credits
about the technique:
- [BanPangar Twitter/X](https://twitter.com/BanPangar/status/1357805358153150467)
- [cyb_detective medium post](https://publication.osintambition.org/4-easy-tricks-for-using-gravatar-in-osint-99c0910d933)email domain sources:
- https://github.com/derhuerst/email-providers
- https://github.com/Kikobeats/free-email-domains
- https://github.com/mstfknn/email-providers\+ some personal additions
## Requirements
```
httpx
unidecode
tqdm
rich
```## License
GPLv3