Email Address Extractor-Free desktop tools and utilities for Windows. Download our software now.
free windows software utility
free windows software tools

Power email marketing. Collect email addresses and send bulk emails


The efficient way to start a marketing campaign!


free software

What is Power Email Address Extractor?


Power Email Address Extractor extracts email addresses from ANY file and stores them in a database. When enough email addresses are collected Power Email Address Extractor starts the marketing campaign by sending advertisement to those addresses.



Who uses Power Email Address Extractor?


Power Email Address Extractor is the most popular bulk email marketing tool. It was specially designed for intensive email marketing campaigns. It is the choice of thousands of companies all over the world. They chose Power Email Address Extractor not only for its flexibility and accuracy but also for its unbeatable price.



E-mail address extractor Features


E-mail address extractor Extract email addresses from any non-encrypted file

E-mail address extractor Automatically filter unwanted email addresses

E-mail address extractor Sort email addresses by domain name

E-mail address extractor Sort email addresses by user name

E-mail address extractor Automatically recognize and filter invalid email addresses!

E-mail address extractor Send bulk email to the extracted emails addresses (up to 500 emails per batch)

Email address extractor|Search/extracts email addresses Easy to use

E-mail address extractor Versatile: It works with Thunderbird, The Bat, Outlook and any other email client
E-mail address extractor Compact: Just download and run it. No installation required!

E-mail address extractor Portable: The program consists in one file so you can easily copy on a flash disk and take it with you
E-mail address extractor Safe: It doesn't install DLLs or other crapware in your system



How to install it?


Email Address Extractor is a delivered in a package to together with several other similar programs. Once unpacked, it does not require being installed. Just double click the program to run it.



  • Power Email Address Extractor doesn't install any (DLLs, ActiveX, DirectX, .Net, Java, Windows services packs, IE updates, etc) crapware in your computer!
  • Power Email Address Extractor is monolithic and portable - which means that you can copy it on a flash stick and run it on any computer without installing it.



Power Email Address Extractor



Release date


Installation required

No (monolithic)


4.4 MB

email extractor download - bulk email marketing software

Email Address Extractor Lite is free!



E-mail address extractor Compatibility matrix

  • Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10

Vista compatible-E-mail address extractor


E-mail address extractor System requirements

  • Pentium i3 with 0.5GB RAM memory
  • 6MB free space on your hard drive


email address extractor -  bulk email marketing software
                                          Power Email Address Extractor and Bulk Email Sender v4



The program consists in the following modules:


Email Extractor


With a double click you can extract email addresses from ANY file (for example HTML web pages, RTF, DOC, Thunderbird inboxes, Outlook inboxes, TXT and even binary files) you have in your computer. The emails extracted are passed through the Email Validator module.


Email Validator


This module has a state of the art allgorithm that automatically detects possible invalid email addresses. It can:

  • Filters duplicate email addresses
  • Filters invalid characters (such as space, '<', '?', etc)
  • Filters addresses that are not correctly formatted (for example
  • Filters email addresses that are too long (such as
  • Filters spam traps (like
  • Filters email addresses that contain too many numbers (example)

Email Composer 



Bulk Email Sender 



What's new in Power Email Address Extractor v4?


Power Email Address Extractor v5 brings many improvements: it is faster, it's interface was drastically improved. The filter was also optimized. IT can extract emails directly from Thunderbird (inbox) files. It has a new 'Bulk email sender' tool. Now you can send up to 900000 emails per hour (this is one email ever two seconds) directly from the program. Even more, you can compose the email right in the program and send it as HTML or plain text.



Email address extractor|Search/extracts email addresses



Web tools

Graphics products

Other products


Useful links



free windows desktop software utility
Site index                 Online support

Email address extractor|Search/extracts email addressesEmail address extractor|Search/extracts email addresses

Email address extractor|Search/extracts email addresses


About email harvesting


The simplest method involves spammers purchasing or trading lists of e-mail addresses from other spammers.

Another common method is the use of special software known as "harvesting bots" or "harvesters", which spider Web pages, posting on Usenet, mailing list archives, and other online sources to obtain e-mail addresses from public data. These have low efficiency.

Spammers may also use a form of dictionary attack in order to harvest e-mail addresses, known as a directory harvest attack, where valid e-mail addresses at a specific domain are found by guessing e-mail address using common usernames in email addresses at that domain. For example, trying alan@example.domain, alana@example.domain, alanb@example.domain, etc and any that are accepted for delivery by the recipient email server, instead of rejected, are added to the list of theoretically valid e-mail addresses for that domain.

Another method of e-mail address harvesting is to offer a product or service free of charge as long as the user provides a valid e-mail address, and then use the addresses collected from users as spam targets. Common products and services offered are jokes of the day, daily bible quotes, news or stock alerts, free merchandise, or even registered sex offender alerts for your area. Another technique was used in late 2007 by the company Date, which used e-mail harvesting directed at subscribers to the Quechup website to spam the victim's friends and contacts.

Spam differs from other forms of direct marketing in many ways, one of them being that it costs little more to send to a larger number of recipients than a smaller number. For this reason, there is little pressure upon spammers to limit the number of addresses targeted in a spam run, or to restrict it to persons likely to be interested. One consequence of this fact is that many people receive spam written in languages they cannot read — a good deal of spam sent to English-speaking recipients is in Chinese or Korean, for instance. Likewise, lists of addresses sold for use in spam frequently contain malformed addresses, duplicate addresses, and addresses of role accounts such as postmaster.

Spammers may harvest e-mail addresses from a number of sources. A popular method uses e-mail addresses which their owners have published for other purposes. Usenet posts, especially those in archives such as Google Groups, frequently yield addresses. Simply searching the Web for pages with addresses — such as corporate staff directories or membership lists of professional societies — using spambots can yield thousands of addresses, most of them deliverable. Spammers have also subscribed to discussion mailing lists for the purpose of gathering the addresses of posters. The DNS and WHOIS systems require the publication of technical contact information for all Internet domains; spammers have illegally trawled these resources for email addresses. Many spammers use programs called web spiders to find email addresses on web pages. Usenet article message-IDs often look enough like email addresses that they are harvested as well.

Spammer viruses may include a function which scans the victimized computer's disk drives (and possibly its network interfaces) for email addresses. These scanners discover email addresses which have never been exposed on the Web or in Whois. A compromised computer located on a shared network segment may capture email addresses from traffic addressed to its network neighbors. The harvested addresses are then returned to the spammer through the bot-net created by the virus.

A recent, controversial tactic, called "e-pending", involves the appending of e-mail addresses to direct-marketing databases. Direct marketers normally obtain lists of prospects from sources such as magazine subscriptions and customer lists. By searching the Web and other resources for e-mail addresses corresponding to the names and street addresses in their records, direct marketers can send targeted spam e-mail. However, as with most spammer "targeting", this is imprecise; users have reported, for instance, receiving solicitations to mortgage their house at a specific street address — with the address being clearly a business address including mail stop and office number.

Spammers sometimes use various means to confirm addresses as deliverable. For instance, including a hidden Web bug in a spam message written in HTML may cause the recipient's mail client to transmit the recipient's address, or any other unique key, to the spammer's Web site. Users can defend against such abuses by turning off their mail program's option to display images, or by reading email as plain-text rather than formatted.

Likewise, spammers sometimes operate Web pages which purport to remove submitted addresses from spam lists. In several cases, these have been found to subscribe the entered addresses to receive more spam.

When persons fill out a form it is often sold to a spammer using a web service or http post to transfer the data. This is immediate and will drop the email in various spammer databases. The revenue made from the spammer is shared with the source. For instance if someone applies online for a mortgage, the owner of this site may have made a deal with a spammer to sell the address. These are considered the best emails by spammers, because they are fresh and the user has just signed up for a product or service that often is marketed by spam.