The Ultimate OSINT Guide — Learn How Information Is Found Online OSINT (Open Source Intelligence) is one of the most powerful techniques used in cybersecurity, investigations, and digital intelligence. Security researchers, analysts, and investigators use publicly available data to gather insights, detect threats, and uncover hidden connections across the internet. In this guide you’ll discover how OSINT can be used for: Digital investigations Online footprint analysis Intelligence gathering from public sources Security research & threat analysis OSINT proves that information is everywhere — if you know where to look. For educational & cybersecurity awareness purposes only. Comment OSINT and check the pinned post on my page for the full guide. Don’t forget to save this post for later. Olá INTERNAUTA, #osint Você está procurando maneiras de economizar dinheiro, melhorar a segurança e aumentar a produtividade de sua empresa? Se sim, você deve considerar usar fontes aberta...
Compartilhe
- Gerar link
- X
- Outros aplicativos
Marcadores
Osint Buster - Find Emails Of A Person And Return Info Associated With Them
8 DAYS AGO 5:37 PM | POST SPONSORED BY FARADAYSEC | MULTIUSER PENTEST ENVIRONMENT ZION3R
Buster is a simple OSINT tool used to:
- Get social accounts from various sources(gravatar,about.me,myspace,skype,github,linkedin,avast)
- Get links to where the email was found using google,twitter,darksearch and paste sites
- Get domains registered with an email (reverse whois)
- Generate possible emails and usernames of a person
- Find the email of a social media account
- Find emails from a username
- Find the work email of a person using hunter.io
Installation
clone the repository:
$ git clone git://github.com/sham00n/buster
$ cd buster/
$ python3 setup.py install
$ buster -h
API keys
This project uses hunter.io to get information from company emails,the first couple "company email" searches dont require a key,if you have an interest in company emails i recommend that you sign up for an account on hunter.io.
Once you get an API key, add it to the file "api-keys.yaml" and rerun the command:
$ python setup.py install
Usage
usage: buster [-h] [-e EMAIL] [-f FIRST] [-m MIDDLE] [-l LAST] [-b BIRTHDATE]
[-a ADDINFO [ADDINFO ...]] [-u USERNAME] [-c COMPANY]
[-p PROVIDERS [PROVIDERS ...]] [-o OUTPUT] [-v] [--list LIST]
Buster is an OSINT tool used to generate and verify emails and return
information associated with them
optional arguments:
-h, --help show this help message and exit
-e EMAIL, --email EMAIL
email adress or email pattern
-f FIRST, --first FIRST
first name
-m MIDDLE, --middle MIDDLE
middle name
-l LAST, --last LAST last name
-b BIRTHDATE, --birthdate BIRTHDATE
birthdate in ddmmyyyy format,type * if you dont
know(ex:****1967,3104****)
-a ADDINFO [ADDINFO ...], --addinfo ADDINFO [ADDINFO ...]
additional info to help guessing the
email(ex:king,345981)
-u USERNAME, --username USERNAME
checks 100+ email providers for the availability of
username@provider.com
-c COMPANY, --company COMPANY
company domain
-p PROVIDERS [PROVIDERS ...], --providers PROVIDERS [PROVIDERS ...]
email provider domains
-o OUTPUT, --output OUTPUT
output to a file
-v, --validate check which emails are valid and returns information
of each one
--list LIST file containing list of emails
Usage examples
Get info of a single email(exists or not,social media where email was used,data breaches,pastes and links to where it was found)
$ buster -e target@example.com
Query for list of emails`
$ buster --list emails.txt
Generate emails that matches the pattern and checks if they exist or not(use the -a argument if you have more info to add(ex: -a nickname fav_color phone #)
$ buster -e j********9@g****.com -f john -l doe -b ****1989
Generate usernames (use with -o option and input the file to recon-ng's profiler module)
$ buster -f john -m james -l doe -b 13071989
Generate emails (use -v if you want to validate and get info of each email)
$ buster -f john -m james -l doe -b 13071989 -p gmail.com yahoo.com
Generate 100+ emails in the format username@provider.com and returns the valid ones(use -p if you dont want all 100+)
$ buster -u johndoe
Generate a company email and returns info associated with it
$ buster -f john -l doe -c company.com
Tips
- You get 200 email validations/day,use them wisely!
- When using the -a option,avoid using small words(ex:j,3,66),the shorter the words are the bigger the email list is and therefore more validations are needed
- when adding an email pattern make sure the service providing the pattern displays it with the right size(facebook,twitter,instagram do...others might not)
- I dont recommend using with Tor as haveibeenpwnd.com,hunter.io and google wont function properly
Thanks
- emailrep.io for being developer friendly
- khast3x,developer of h8mail which was used as a reference for this README file
- The OSINT community for being awesome!
Notes
- My Code is ugly,i know...if you know how to do things better let me know!
- If you have any suggestions or improvements email me at sham00n at protonmail dot com
- Gerar link
- X
- Outros aplicativos
Marcadores:
Open Source Intelligence (OSINT)
Postagens mais visitadas
🇧🇷 Ferramentas OSINT mais usadas por policiais no Brasil
- Gerar link
- X
- Outros aplicativos
Comandos Google Dorks
- Gerar link
- X
- Outros aplicativos
Ferramentas de pesquisa
- Gerar link
- X
- Outros aplicativos
Gmail OSINT: Como investigar contas do Gmail com ferramentas OSINT
- Gerar link
- X
- Outros aplicativos
Top 10 Popular Open Source Intelligence (OSINT) Tools
- Gerar link
- X
- Outros aplicativos



Comentários
Postar um comentário