Open source research with OSRFramework (search by mail, nickname, domain)
OSRFramework is an abbreviation of the Open Sources Research Framework. The program has good functionality, especially interesting are not often found functions for checking the existence of an email address and searching for sites where it was used; search by nickname (username) on various sites; search for arbitrary strings in popular social networks.
The program is actively developed, at the moment all the functionality is up-to-date, i.e. it is workable.
By the way, if you know other interesting and relevant programs aimed at finding information about users on open sources, then write them in the comments.
How to use OSRFramework
In this OSRFramework manual, the main functions of the program are considered, although the questions of using the API and the web interface are not touched; you should keep in mind this platform provides such possibilities.
OSRFramework consists of several components, each has its own purpose. In this guide are considered not all modules, information about other modules, as well as all options, you can find on the page https://en.kali.tools/?p=674.
How to install OSRFramework
Installation in Kali Linux
sudo apt install osrframework
Installation in Ubuntu, Linux Mint, Debian and other their derivatives
sudo apt update sudo apt install python-pip python-setuptools sudo pip install --upgrade pip sudo pip install osrframework
To update OSRFramework:
sudo pip install osrframework --upgrade
Installation in BlackArch, Arch Linux
The program is preinstalled in BlackArch, or it can be installed with the command:
sudo pacman -S osrframework
But if you have problems with the previously installed program, and to install into Arch Linux and its derivatives, use the following commands:
sudo pacman -Rcc osrframework sudo pacman -S python2-setuptools sudo pip2 install --upgrade pip sudo pip2 install osrframework
To update OSRFramework:
sudo pip2 install osrframework --upgrade
Check email address leaks
The mailfy module is responsible for checking where email address leak. After the -m option, you must specify an email address, for example:
mailfy.py -m 'email@example.com'
That is, the program checks which sites, which social networks, which web applications use the specified e-mail address.
Using the -n option, you can enter a user name without a domain. Then the program will begin by determining which mailboxes are available for the given login (currently it is checked on 22 popular mail services). Example:
mailfy.py -n 'proghoster'
After the existing e-mail addresses have been determined, a check is made for each of these addresses – where it was leaked.
Generating possible user names based on personal information
The alias_generator module is responsible for generating possible user names based on personal information. It works in interactive mode, so run it:
And consistently enter the data (you can skip some fields):
- First surname
- Second surname
- Year (e. g.: birthyear)
- Extra words to add (',' separated)
Search for profiles by user name
usufy checks if there is a username (profile) on a large number of platforms (about 300).
After the -n option, you must specify a user name:
usufy.py -n miloserdov
Checking for registered domains in different zones (TLD)
domainfy will check the existence of a given domain for a very large number of top-level domains.
The domain name string (without .org, .com, etc.) should be specified after the -n option.
After the -t option, you need to specify a group of top-level domains, by which the name will be checked. Available options are 'all', 'none', 'cc', 'brand', 'global', 'generic', 'other', 'geographic'.
domainfy.py -n miloserdov -t all
One more example:
domainfy.py -n habrahabr -t all
Search for profiles by full names and other information
It can do searchfy. You can specify a user name, nickname, or any other arbitrary string. The string should be specified after the -q option.
Search for the specified string (-q "Ivan Petrov") in 'facebook', 'github', 'pgpmit', 'skype', 'twitter', 'youtube':
searchfy.py -q "Иван Петров"
One more example:
searchfy.py -q "Alexey Miloserdov"
Online services for finding information about users
You do not have to run Linux to use the OSRFramework services to find information from open sources. On SuIP.biz were added some of the most interesting of its features. Therefore, you can search online and free of charge by email addresses, nicknames of users and by name and surname:
- Checking the existence of a given mail
- Check the existence of a profile
- Search for profiles by full names
- Checking the existence of domains
- How to find out all the sites on the same IP and in the same subnet (100%)
- How to find out the exact model of a router (wireless access point) (100%)
- How to detect all Wi-Fi devices in the area? (100%)
- How to hack Wi-Fi in Windows (100%)
- 3WiFi: open database of Wi-Fi Access Points passwords (100%)
- How to collect Location, Country or ISP IP Ranges (RANDOM - 50%)