What is H4X-Tools?
H4X-Tools is a modular, terminal-based toolkit designed for Open Source Intelligence (OSINT), reconnaissance, and data scraping operations. Created by developer vil in April 2022, this Python-based suite has grown into a comprehensive collection of 16 specialized tools that security professionals, penetration testers, and researchers use for information gathering and reconnaissance activities.
The toolkit operates entirely from the command line and provides a unified interface for various OSINT operations, from social media scraping to network scanning. With over 630 stars on GitHub and active development through early 2026, H4X-Tools has established itself as a practical solution for security professionals who need reliable, scriptable tools for their reconnaissance workflows.
Getting Started
H4X-Tools requires Python 3.10 or higher and Git for installation. The setup process is straightforward across both supported platforms:
Linux Installation:
git clone https://github.com/vil/h4x-tools.git
cd h4x-tools
sh setup.shWindows Installation:
git clone https://github.com/vil/h4x-tools.git
cd h4x-tools
setup.batThe setup scripts automatically install all required dependencies and offer the option to build a standalone executable using PyInstaller. For manual dependency installation:
pip install -r requirements.txtOnce installed, launch the toolkit with:
python h4xtools.pyUsage & Practical Examples
H4X-Tools provides a menu-driven interface that makes it accessible even for users new to OSINT tools. Here are some practical usage scenarios:
Social Media Intelligence Gathering:
The Instagram scraper offers two operational modes. Guest mode provides basic public profile information without requiring authentication, while authenticated mode (using an Instagram sessionid cookie) accesses richer data through Instagram's private mobile API. This includes business account flags, IGTV content counts, and publicly listed contact information.
Comprehensive Web Reconnaissance:
The web reconnaissance module supports seven distinct search modes, each optimized for specific intelligence gathering objectives. The Person mode employs 12 specialized search dorks, while the Email mode uses 8 targeted queries. Domain reconnaissance utilizes 12 specific dorks designed to uncover infrastructure details, and the Username mode searches across 12 different platforms.
Breach and Credential Intelligence:
The leak search functionality queries multiple data sources simultaneously. For email addresses, it cross-references the Hudson Rock Cavalier database for stealer-log records and the ProxyNova COMB dataset containing over 3.2 billion leaked credential entries. Results include compromise dates, stealer malware families, and masked credential samples.



