Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses ๐Ÿ•ต๏ธ

Overview

Profil3r

Buy Me A Coffee

Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses. This program also alerts you to the presence of a data leak for the found emails.

๐Ÿ’ก Prerequisite

Python 3

๐Ÿ› ๏ธ Installation

git clone https://github.com/Rog3rSm1th/Profil3r.git
cd Profil3r/
python3 setup.py install

Features

โœ‰๏ธ Emails

  • Data leaks
  • Emails

๐ŸŒ Social

  • Instagram
  • Facebook
  • Twitter
  • Tiktok
  • Pinterest
  • Linktr.ee

๐ŸŽต Music

  • Soundcloud
  • Spotify

โ€๐Ÿ’ป Programming

  • Github
  • Pastebin
  • Repl.it

๐Ÿ’ฌ Forum

  • 0x00sec.org
  • Jeuxvideo.com
  • Hackernews

๐Ÿ—ฃ๏ธ Tchat

  • Skype

๐Ÿ“บ Entertainment

  • Dailymotion

๐Ÿšซ Porn

  • PornHub
  • RedTube

๐Ÿ’ธ Money

  • BuyMeACoffee

๐Ÿ“– Report

A report in JSON format is automatically generated in the reports folder

โš™๏ธ The config.json file

You can modify the report path and the services Profil3r will search in the config.json file

Field Type Default Description
report_elements Array ["email", "facebook", "twitter"] List of the services for which profil3r will search
report_path String "./reports/{}.json" The path of the report's JSON file, this path must include a {} which corresponds to the file name
separators Object {"Dot": ".", "Dash": "-", "Underscore": "_"} List of separators to separate items, for example: john.doe, john-doe, john_doe

๐Ÿ“š Example

python3 profil3r.py john doe

๐Ÿ“ License

This project is under the MIT license.

Contact

for any remark, suggestion or job offer, you can contact me at [email protected] or on twitter @Rog3rSm1th

You might also like...
The Devils Eye is an OSINT tool that searches the Darkweb for onion links and descriptions that match with the users query without requiring the use for Tor.
The Devils Eye is an OSINT tool that searches the Darkweb for onion links and descriptions that match with the users query without requiring the use for Tor.

The Devil's Eye searches the darkweb for information relating to the user's query and returns the results including .onion links and their description

This tool was created in order to automate some basic OSINT tasks for penetration testing assingments.

This tool was created in order to automate some basic OSINT tasks for penetration testing assingments. The main feature that I haven't seen much anywhere is the downloadd google dork function where this function first perform basic google dorking to find the targets public documents. These documents will then be downloaded to the attackers computer and can be used further to identify metadata about the client.

An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic lights, Refridgerators, Smart TVs etc.

An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic

Mr.Holmes is a information gathering tool (OSINT)
Mr.Holmes is a information gathering tool (OSINT)

๐Ÿ” Mr.Holmes Mr.Holmes is a information gathering tool (OSINT). Is main purpose is to gain information about domains,username and phone numbers with t

A OSINT tool coded in python

Argus Welcome to Argus, a OSINT tool coded in python. Disclaimer I Am not responsible what you do with the information that is given to you by my tool

SSH Tool For OSINT and then Cracking.
SSH Tool For OSINT and then Cracking.

sshmap SSH Tool For OSINT and then Cracking. Linux Systems Only Usage: Scanner Syntax: scanner start/stop/status - Sarts/stops/sho

A simple python-function, to gain all wlan passwords from stored wlan-profiles on a computer.

Wlan Fetcher Windows10 Description A simple python-function, to gain all wlan passwords from stored wlan-profiles on a computer. Usage This Script onl

Dependency Combobulator is an Open-Source, modular and extensible framework to detect and prevent dependency confusion leakage and potential attacks.

Dependency Combobulator Dependency Combobulator is an Open-Source, modular and extensible framework to detect and prevent dependency confusion leakage

A small POC plugin for launching dumpulator emulation within IDA, passing it addresses from your IDA view using the context menu.

Dumpulator-IDA Currently proof-of-concept This project is a small POC plugin for launching dumpulator emulation within IDA, passing it addresses from

Releases(v1.4.8)
  • v1.4.8(Aug 10, 2021)

  • v1.4.7(Aug 7, 2021)

  • v1.4.6(Aug 4, 2021)

    What's changed?

    • Profil3r now supports 4 new services : Cashapp, Instructables, Ello and Bandcamp
    • It is now easier to create a module
    • Minor improvements : The output is managed in a cleaner way, The structure of the project has been refactored to make it simpler.
    Source code(tar.gz)
    Source code(zip)
  • v1.4.5(Jul 26, 2021)

    Whatโ€™s Changed?

    • Profil3r now supports 4 new services : Root-me, Asciinema, Dev.to and Codementor
    • It is now easier to automatically test services to see if they are functional using unit tests performed with pytest
    Source code(tar.gz)
    Source code(zip)
  • 1.4.4(Jul 11, 2021)

    Whatโ€™s Changed?

    • Profil3r now supports PyPi and NPM.
    • Creation of an install.sh script to easily test the program during development.
    • Add a FUNDING.yml to allow people to support the project.
    Source code(tar.gz)
    Source code(zip)
  • 1.4.3(Jul 9, 2021)

Owner
Nothing is impossible unless you can't do it.
Show apps recorded storage files by jailbreak

0x101 Show registered storage files of apps by jailbreak Legal disclaimer: Usage of insTof for attacking targets without prior mutual consent is illeg

0x 4 Oct 24, 2022
LinOTP - the open source solution for two factor authentication

LinOTP LinOTP - the Open Source solution for multi-factor authentication Copyright ยฉ 2010-2019 KeyIdentity GmbH Coypright ยฉ 2019- arxes-tolina GmbH In

LinOTP 462 Jan 02, 2023
Separate handling of protected media in Django, with X-Sendfile support

Django Protected Media Django Protected Media is a Django app that manages media that are considered sensitive in a protected fashion. Not only does t

Cobus Carstens 46 Nov 12, 2022
APKLeaks - Scanning APK file for URIs, endpoints & secrets.

APKLeaks - Scanning APK file for URIs, endpoints & secrets.

dw1 3.5k Jan 09, 2023
Midas ELF64 Injector is a tool that will help you inject a C program from source code into an ELF64 binary.

Midas ELF64 Injector Description Midas ELF64 Injector is a tool that will help you inject a C program from source code into an ELF64 binary. All you n

midas 20 Dec 24, 2022
ProxyLogon Pre-Auth SSRF To Arbitrary File Write

ProxyLogon Pre-Auth SSRF To Arbitrary File Write For Education and Research Usage: C:\python proxylogon.py mail.evil.corp lulz 117 Nov 28, 2022

Universal Radio Hacker: Investigate Wireless Protocols Like A Boss

The Universal Radio Hacker (URH) is a complete suite for wireless protocol investigation with native support for many common Software Defined Radios.

Dr. Johannes Pohl 9k Jan 03, 2023
Springboot directory scanning

Springboot directory scanning

WINEZERO 87 Dec 28, 2022
Bypass 4xx HTTP response status codes.

Forbidden Bypass 4xx HTTP response status codes. To see all the test cases, check the source code - follow the NOTE comments. Script uses multithreadi

Ivan ล incek 165 Dec 28, 2022
MSDorkDump is a Google Dork File Finder that queries a specified domain name and variety of file extensions

MSDorkDump is a Google Dork File Finder that queries a specified domain name and variety of file extensions (pdf, doc, docx, etc), and downloads them.

Joe Helle 150 Jan 03, 2023
DNSSEQ: PowerDNS with FALCON Signature Scheme

PowerDNS-based proof-of-concept implementation of DNSSEC using the post-quantum FALCON signature scheme.

Nils Wisiol 4 Feb 03, 2022
Code to do NF in HDR,HEVC,HPL,MPL

Netflix-DL 6.0 |HDR-HEVC-MPL-HPL NOT Working| ! Buy working netflix cdm from [em

4 Dec 28, 2021
Seamless deployment and management of cybersecurity solutions ๐Ÿ—๏ธ

Description ๐Ÿ–ผ๏ธ Background ๐Ÿ‘ด๐Ÿผ Vision ๐Ÿ“œ Concepts ๐Ÿ’ฌ Solutions' Lifecycle. Operations โญ• Functionalities ๐Ÿš€ Supported Cybersecurity Solutions ๐Ÿ“ฆ Insta

MutableSecurity 36 Nov 10, 2022
Tinyman exploit finder - Tinyman exploit finder for python

tinyman_exploit_finder There was a big tinyman exploit. You can read about it he

fish.exe 9 Dec 27, 2022
Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell

Unauthenticated Sqlinjection that leads to dump database but this one impersonated Admin and drops a interactive shell

sam 16 Nov 09, 2022
NExfil is an OSINT tool written in python for finding profiles by username.

NExfil is an OSINT tool written in python for finding profiles by username. The provided usernames are checked on over 350 websites within few seconds.

thewhiteh4t 1.4k Jan 01, 2023
Tools for converting Nintendo DS binaries to an ELF file for Ghidra/IDA

nds2elf Requirements nds2elf.py uses LIEF and template.elf to form a new binary. LIEF is available via pip: pip3 install lief Usage DSi and DSi-enhan

Max Thomas 17 Aug 14, 2022
๐Ÿ” IRIS: An open-source intelligence framework

IRIS is an open-source OSINT framework, consisting of modules to find information about a target by scraping sites and fetching data from APIs.

IRIS 79 Dec 20, 2022
Pass2Pwn: a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name

Pass2Pwn is a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name

Nirmal Dahal 10 Oct 15, 2022
logmap: Log4j2 jndi injection fuzz tool

logmap - Log4j2 jndi injection fuzz tool Used for fuzzing to test whether there are log4j2 jndi injection vulnerabilities in header/body/path Use http

ไน‹ไนŽ่€…ไนŸ 67 Oct 25, 2022