Cyber security

Eyes: Email-Centric OSINT Uncovered

Eyes is an OSINT tool that focuses on extracting information related to an email address.

Whether you’re a cybersecurity professional, a private investigator, or just a curious individual, Eyes can provide insights into the digital footprint associated with a specific email.

It scours various platforms and databases to fetch data, making your investigation process smoother and more comprehensive.

Installation Guide:

Getting Eyes up and running is straightforward. Follow these steps:

  1. Clone the repository from GitHub:
$ git clone https://github.com/N0rz3/Eyes.git

2. Navigate to the Eyes directory:

$ cd ./Eyes

3. Install the required packages:

$ pip3 install -r requirements.txt

Using Eyes: A Quick Guide

Once you’ve successfully installed Eyes, using it is a breeze. Here’s a quick guide to get you started:

Basic Command Structure:

The primary command structure for Eyes is as follows:

python eyes.py [-h] [-m] [email]

Positional Argument:

  • email: Input the target email address here. Eyes will then search for information related to this email across various modules and services.

Options:

  • -h, --help: Displays a help message, providing an overview of the tool and its options.
  • -m, --modules: Provides a list of all the email modules utilized by Eyes.

Examples of Usage:

  1. Basic Email Search: To search for information related to “example@email.com“, use:
python eyes.py example@email.com

2. Viewing Available Modules: To see a list of all the modules Eyes can use in its search, type:

python eyes.py -m

3. Help: If you need assistance or a quick refresher, use the help option:

python eyes.py -h
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

4 days ago

Best Linux Distros in 2026

Linux is renowned for its versatility, open-source nature, and security. Whether you're a beginner, developer,…

4 days ago

Top 10 Cyber Insurance Companies in 2026

Cyber insurance helps businesses and individuals mitigate financial losses from data breaches, ransomware, extortion, legal…

4 days ago

Ransomware Incident Response

Ransomware is one of the most dangerous and destructive forms of cybercrime today. With cybercriminals…

4 days ago

Best Social Media Search Engines and Tools for 2026

Social media is a key part of our daily lives, with millions of users sharing…

4 days ago

How to Remove Your Personal Information from Data Broker Websites (2026 Guide)

What Are Data Brokers? Data brokers are companies that collect, aggregate, and sell personal information,…

4 days ago