Fb_Friend_List_Scraper is a OSINT tool to scrape names and usernames from large friend lists on Facebook, without being rate limited.
python -m pip install fb-friend-list-scraper
fbfriendlistscraper
-h
or --help
to show usage information.usage: fbfriendlistscraper [-h] -e EMAIL [-p PASSWORD] -u USERNAME [-o OUTFILE] [-w] [-q] [-x] [-s SLEEPMULTIPLIER] [-i PROXY] [-c CMD]
Tool to scrape names and usernames from large friend lists on Facebook, without being rate limited
options:
-h, –help show this help message and exit
-e EMAIL, –email EMAIL
Email address or phone number to login with.
-p PASSWORD, –password PASSWORD
Password to login with. If not supplied you will be prompted. You really shouldn’t use this for security reasons.
-u USERNAME, –username USERNAME
Username of the user to scrape.
-o OUTFILE, –outfile OUTFILE
Path of the output file. (Default: ./scraped_friends.txt)
-w, –headless Run webdriver in headless mode.
-q, –quiet Do not print scraped users to screen.
-x, –onlyusernames Only the usernames/IDs will be written to the output file.
-s SLEEPMULTIPLIER, –sleepmultiplier SLEEPMULTIPLIER
Multiply sleep time between each page scrape by n. Useful when being easily rate-limited.
-i PROXY, –proxy PROXY
Proxy server to use for connecting. Username/password can be supplied like: socks5://user:pass@host:port
-c CMD, –cmd CMD Shell command to run after each page scrape. Useful for changing proxy/VPN exit.
examples:
fbfriendlistscraper -e your@email.com -p YourPassword123 -u someusername.123 -o my_file.txt
fbfriendlistscraper –email your@email.com –username another.user –headless -s 2 -x
fbfriendlistscraper -e your@email.com -u username.johnson -w –proxy socks5://127.0.0.1:9050
fbfriendlistscraper -e your@email.com -u xxuserxx –headless –cmd “mullvad relay set provider Quadranet”
fbfriendlistscraper -e your@email.com -u markzuckerburger -w -o ./test.txt –cmd “killall -HUP tor”
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…