Blackbird – OSINT Tool to Find Accounts Using Username

Blackbird is a user name enumeration tool developed by Cyber Hunter Lab. This is one of the OSINT tools to find usernames across social media websites.

What is OSINT?

Open-source intelligence (OSINT) methods involve collecting, analyzing, and disseminating publicly available information to address specific intelligence requirements.

This information is gathered from diverse sources and distributed to the appropriate audience at the appropriate time.

Using these tools enables the comprehensive analysis and collection of information about a particular topic. However, the process can be laborious and time-consuming.

Blackbird Tool

This new user enumeration tool was developed by Cyber Hunter Lab and allowed to use only for Educational purposes.

The tool will check for over 581 websites within a second for a given username and display a graphical result.

The tool was found to be developed in React JS and is available to use with Linux, Mac, and Windows platforms.

According to the developers, the tool has over 1000 UserAgents to cross the information from the social media for the targeted username.

The tool can also extract data such as bio, location, and profile picture along with the username.

Features

  • Implement Flask Web Server to optimize UX
  • Export results in PDF
  • Implement metadata extraction
  • Publish a docker image
  • Deploy on Cloud
  • Export results in CSV

Installation

git clone https://github.com/p1ngul1n0/blackbird
cd blackbird

Install requirements

pip install -r requirements.txt

Usage

Search by username
python blackbird.py -u username

To Find Supported Websites

python blackbird.py –list-sites

To Use proxy

python blackbird.py -u crash –proxy http://127.0.0.1:8080

Please consider following and supporting us to stay updated with the latest information.

Linumonk

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

13 hours ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

4 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

4 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

4 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

6 days ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

1 week ago