Cyber security

DetectDee – The Ultimate Guide To Tracing Social Media Profiles

DetectDee is a cutting-edge tool designed to streamline the process of locating social media accounts across various platforms by utilizing usernames, email addresses, or phone numbers.

Tailored for cybersecurity experts, it offers precision, evasion capabilities against web application firewalls, and easy integration.

This guide delves into the functionalities, installation, and usage of DetectDee, ensuring a seamless experience for those aiming to enhance their digital investigations.

Feat

  • Includes sites frequently used by CyberSecurity practitioners
  • Hunt down social media accounts by username, email or phone
  • Precise thread control and custom request headers are used to prevent WAF recognition
  • Extensible, simple, and easy-to-use template
  • Integration of mobile versions of social networking sites

Install

Compile

git clone https://github.com/piaolin/DetectDee.git
cd DetectDee
go mod tidy
go run .

Usage

English

Detect

Hunt down social media accounts by username, email or phone across social networks

Usage:
  DetectDee detect [flags]

Flags:
  -c, --check           self-check
  -e, --email strings   email[s], e.g. mail@gmail.com,45715485@qq.com
  -f, --file string     Site data file (default "data.json")
  -g, --google          Show google search result
  -h, --help            help for detect
  -n, --name strings    name[s], e.g. piaolin,poq79,SomeOneYouLike
      --nsfw            Include checking of NSFW sites from default list.
  -o, --output string   Result file (default "result.txt")
  -p, --phone strings   phone[s], e.g. 15725753684,13575558962
      --precisely       Check precisely
      --proxy string    Make requests over a proxy. e.g. socks5://127.0.0.1:1080
  -r, --retry int       Retry times after request failed (default 3)
  -s, --site strings    Limit analysis to just the listed sites. Add multiple options to specify more than one site.
  -t, --timeout int     Time (in seconds) to wait for response to requests (default 10)
      --token string    chatgpt api token

Global Flags:
  -v, --verbose   verbose output

Please update the data for the first time

./DetectDee update

To search for only one user:

./DetectDee detect -n piaolin

To search for more than one user:

./DetectDee detect -n piaolin,blue

To search for more than one user and use ChatGPT for user tagging of results(need ChatGPT token):

./DetectDee detect -n piaolin,blue --token {ChatGPT Token}

To search for email:

./DetectDee detect -e mail@gmail.com,test@163.com

To search for phone:

./DetectDee detect -p 15822575984,13188524682

Show google search(please check yourself):

./DetectDee detect -n piaolin,blue -g

To search in specified site:

./DetectDee detect -n piaolin -s github,v2ex

For more information click here

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

3 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago