Buster is a tool to find emails of a person and return info associated with them. It is a simple OSINT tool used to:
Installation
Clone the repository:
$ git clone git://github.com/sham00n/buster
Once you have a copy of the source, you can install it with:
$ cd buster/
$ python3 setup.py install
$ buster -h
API keys
This project uses hunter.io to get information from company emails,the first couple “company email” searches dont require a key,if you have an interest in company emails i recommend that you sign up for an account on hunter.io.
Also Read : Vulnado – Intentionally Vulnerable Java Application
Once you get an API key, add it to the file “api-keys.yaml” and rerun the command:
$ python setup.py install
Usage
Usage examples
Get info of a single email(exists or not,social media where email was used,data breaches,pastes and links to where it was found)
$ buster -e target@example.com
Query for list of emails`
$ buster –list emails.txt
Generate emails that matches the pattern and checks if they exist or not(use the -a argument if you have more info to add(ex: -a nickname fav_color phone #)
$ buster -e j9@g****.com -f john -l doe -b ****1989
Generate usernames (use with -o option and input the file to recon-ng’s profiler module)
$ buster -f john -m james -l doe -b 13071989
Generate emails (use -v if you want to validate and get info of each email)
$ buster -f john -m james -l doe -b 13071989 -p gmail.com yahoo.com
Generate 100+ emails in the format username@provider.com and returns the valid ones(use -p if you dont want all 100+)
$ buster -u johndoe
Generate a company email and returns info associated with it
$ buster -f john -l doe -c company.com
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…