Command-line discovery tool for finding publicly listed business email addresses from domain lists with resumable execution, rate discipline, and inspectable outputs.
- Repository role: operational discovery tool only
- Repository class: standalone operator tooling
- Public host ownership: none
- Deployment model: local CLI and repository workflow surface
- License: Apache License Version 2.0
MAILSIEVE is a bounded collection utility for:
- reading domain lists
- crawling public web pages politely
- extracting candidate business email addresses
- preserving resumability across long runs
- producing reviewable output and logs
MAILSIEVE is not:
- a proof system
- a verifier
- an authority service
- a governance surface
- a compliance engine
- an identity system
- a guarantee of validity, ownership, consent, deliverability, or permission
MAILSIEVE discovers public contact data candidates. It does not convert them into verified truth.
Inputs:
- domain lists
- public web pages reachable from those domains
- operator-selected rate and concurrency settings
Outputs:
- candidate email address rows
- processed-domain state
- crawl logs for operator review
- diagnostic output
Current repository files include:
mailsieve.mjsbatch-run.shreset-hard.shextract_emails.pydomains.txtdomains.clean.txt
A reader landing here should be able to answer immediately:
- What does MAILSIEVE do? Public email discovery from domains.
- What does it not do? It does not verify or authorize anything.
- Does it own a public product host? No.
- Are outputs self-authenticating? No.
A contribution here is wrong if it:
- upgrades discovery language into verification language
- implies legality, consent, or authority from collection output
- adds deployment or package claims not backed by repository metadata
- turns logs into claimed proof
Apache License Version 2.0. See LICENSE.