Cyber security

Eyes: Email-Centric OSINT Uncovered

Eyes is an OSINT tool that focuses on extracting information related to an email address.

Whether you’re a cybersecurity professional, a private investigator, or just a curious individual, Eyes can provide insights into the digital footprint associated with a specific email.

It scours various platforms and databases to fetch data, making your investigation process smoother and more comprehensive.

Installation Guide:

Getting Eyes up and running is straightforward. Follow these steps:

  1. Clone the repository from GitHub:
$ git clone https://github.com/N0rz3/Eyes.git

2. Navigate to the Eyes directory:

$ cd ./Eyes

3. Install the required packages:

$ pip3 install -r requirements.txt

Using Eyes: A Quick Guide

Once you’ve successfully installed Eyes, using it is a breeze. Here’s a quick guide to get you started:

Basic Command Structure:

The primary command structure for Eyes is as follows:

python eyes.py [-h] [-m] [email]

Positional Argument:

  • email: Input the target email address here. Eyes will then search for information related to this email across various modules and services.

Options:

  • -h, --help: Displays a help message, providing an overview of the tool and its options.
  • -m, --modules: Provides a list of all the email modules utilized by Eyes.

Examples of Usage:

  1. Basic Email Search: To search for information related to “example@email.com“, use:
python eyes.py example@email.com

2. Viewing Available Modules: To see a list of all the modules Eyes can use in its search, type:

python eyes.py -m

3. Help: If you need assistance or a quick refresher, use the help option:

python eyes.py -h
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

3 weeks ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 month ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

1 month ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

1 month ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 month ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 month ago