Cyber security

DetectDee – The Ultimate Guide To Tracing Social Media Profiles

DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing usernames, email addresses, or phone numbers.

Tailored for cybersecurity experts, it offers precision, evasion capabilities against web application firewalls, and easy integration.

This guide delves into the functionalities, installation, and usage of DetectDee, ensuring a seamless experience for those aiming to enhance their digital investigations.

Feat

  • Includes sites frequently used by CyberSecurity practitioners
  • Hunt down social media accounts by username, email or phone
  • Precise thread control and custom request headers are used to prevent WAF recognition
  • Extensible, simple, and easy-to-use template
  • Integration of mobile versions of social networking sites

Install

Compile

git clone https://github.com/piaolin/DetectDee.git
cd DetectDee
go mod tidy
go run .

Usage

English

Detect

Hunt down social media accounts by username, email or phone across social networks

Usage:
  DetectDee detect [flags]

Flags:
  -c, --check           self-check
  -e, --email strings   email[s], e.g. mail@gmail.com,45715485@qq.com
  -f, --file string     Site data file (default "data.json")
  -g, --google          Show google search result
  -h, --help            help for detect
  -n, --name strings    name[s], e.g. piaolin,poq79,SomeOneYouLike
      --nsfw            Include checking of NSFW sites from default list.
  -o, --output string   Result file (default "result.txt")
  -p, --phone strings   phone[s], e.g. 15725753684,13575558962
      --precisely       Check precisely
      --proxy string    Make requests over a proxy. e.g. socks5://127.0.0.1:1080
  -r, --retry int       Retry times after request failed (default 3)
  -s, --site strings    Limit analysis to just the listed sites. Add multiple options to specify more than one site.
  -t, --timeout int     Time (in seconds) to wait for response to requests (default 10)
      --token string    chatgpt api token

Global Flags:
  -v, --verbose   verbose output

Please update the data for the first time

./DetectDee update

To search for only one user:

./DetectDee detect -n piaolin

To search for more than one user:

./DetectDee detect -n piaolin,blue

To search for more than one user and use ChatGPT for user tagging of results(need ChatGPT token):

./DetectDee detect -n piaolin,blue --token {ChatGPT Token}

To search for email:

./DetectDee detect -e mail@gmail.com,test@163.com

To search for phone:

./DetectDee detect -p 15822575984,13188524682

Show google search(please check yourself):

./DetectDee detect -n piaolin,blue -g

To search in specified site:

./DetectDee detect -n piaolin -s github,v2ex

For more information click here

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

13 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

13 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

13 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

13 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

14 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

16 hours ago