Friday, June 10, 2022
HomeHackerAn OSINT Software To Search For Accounts By Username In 101 Social...

An OSINT Software To Search For Accounts By Username In 101 Social Networks




An OSINT instrument to look quick for accounts by username throughout 101 websites.

The Lockheed SR-71 “Blackbird” is a long-range, high-altitude, Mach 3+ strategic reconnaissance plane developed and manufactured by the American aerospace firm Lockheed Company.

Disclaimer

This or earlier program is for Academic objective ONLY. Don't use it with out permission. 
The same old disclaimer applies, particularly the
truth that me (P1ngul1n0) is just not accountable for any
damages brought on by direct or oblique use of the data or performance offered by these
packages. The creator or any Web supplier bears NO duty for content material or misuse
of those packages or any derivatives thereof. By utilizing these packages you settle for the very fact
that any injury (dataloss, system crash, system compromise, and so on.) brought on by means of these
packages is just not P1ngul1n0's duty.

Setup

Clone the repository

git clone https://github.com/p1ngul1n0/blackbird
cd blackbird

Set up necessities

pip set up -r necessities.txt

Utilization

Search by username

python blackbird.py -u username

Run WebServer

python blackbird.py --web

Entry http://127.0.0.1:5000 on the browser

Learn outcomes file

python blackbird.py -f username.json

Record supportted websites

python blackbird.py --list-sites

Supported Social Networks

  1. Fb
  2. YouTube
  3. Twitter
  4. Telegram
  5. TikTok
  6. Tinder
  7. Instagram
  8. Pinterest
  9. Snapchat
  10. Reddit
  11. Soundcloud
  12. Github
  13. Steam
  14. Linktree
  15. Xbox Gamertag
  16. Twitter Archived
  17. Xvideos
  18. PornHub
  19. Xhamster
  20. Periscope
  21. Ask FM
  22. Vimeo
  23. Twitch
  24. Pastebin
  25. WordPress Profile
  26. WordPress Website
  27. AllMyLinks
  28. Buzzfeed
  29. JsFiddle
  30. Sourceforge
  31. Kickstarter
  32. Smule
  33. Blogspot
  34. Tradingview
  35. Web Archive
  36. Alura
  37. Behance
  38. MySpace
  39. Disqus
  40. Slideshare
  41. Rumble
  42. Ebay
  43. RedBubble
  44. Kik
  45. Roblox
  46. Armor Video games
  47. Fortnite Tracker
  48. Duolingo
  49. Chess
  50. Shopify
  51. Untappd
  52. Final FM
  53. Money APP
  54. Imgur
  55. Trello
  56. MCUUID Minecraft
  57. Patreon
  58. DockerHub
  59. Kongregate
  60. Vine
  61. Gamespot
  62. Shutterstock
  63. Chaturbate
  64. ProtonMail
  65. TripAdvisor
  66. RapidAPI
  67. HackTheBox
  68. Wikipedia
  69. Buymeacoffe
  70. Arduino
  71. League of Legends Tracker
  72. Lego Concepts
  73. Fiverr
  74. Redtube
  75. Dribble
  76. Packet Storm Safety
  77. Ello
  78. Medium
  79. Hackaday
  80. Keybase
  81. HackerOne
  82. BugCrowd
  83. DevPost
  84. OneCompiler
  85. TryHackMe
  86. Lyrics Coaching
  87. Expo
  88. RAWG
  89. Coroflot
  90. Cloudflare
  91. Wattpad
  92. Mixlr
  93. ImageShack
  94. Freelancer
  95. Dev To
  96. BitBucket
  97. Ko Fi
  98. Flickr
  99. HackerEarth
  100. Spotify
  101. Snapchat Tales

Supersonic velocity

Blackbird sends async HTTP requests, permitting much more velocity when discovering person accounts.

JSON Template

Blackbird makes use of JSON as a template to retailer and skim knowledge.

The knowledge.json file retailer all websites that blackbird confirm.

Params

  • app – Website identify
  • url
  • legitimate – Python expression that returns True when person exists
  • id – Distinctive numeric ID
  • technique – HTTP technique
  • json – JSON physique POST (must be escaped, use this
    https://codebeautify.org/json-escape-unescape)
  • {username} – Username place (URL or Physique)
  • response.standing – HTTP response standing
  • responseContent – Uncooked response physique
  • soup – Beautifulsoup parsed response physique
  • jsonData – JSON response physique

Examples

GET

    {
"app": "ExampleAPP1",
"url": "https://www.instance.com/{username}",
"legitimate": "response.standing == 200",
"id": 1,
"technique": "GET"
}

POST JSON

    {
"app": "ExampleAPP2",
"url": "https://www.instance.com/person",
"legitimate": "jsonData['message']['found'] == True",
"json": "{{"kind": "username","enter": "{username}"}}",
"id": 2,
"technique": "POST"
}

When you’ve got any suggestion of a web site to be included within the search, make a pull request following the template.

Contact

Be happy to contact me on Twitter



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments