FisherMan : CLI Program That Collects Information From Facebook User Profiles Via Selenium

FisherMan is a CLI Program That Collects Information From Facebook User Profiles Via Selenium

Installation

#clone the repo
$ git clone https://github.com/Godofcoffe/FisherMan
#change the working directory to FisherMan
$ cd FisherMan
#install the requeriments
$ python3 -m pip install -r requeriments.txt
#dependency:
you need to install geckodriver on your machine,
download the binary from the official mozilla repo:
https://github.com/mozilla/geckodriver/releases/latest
extract and copy the binary, i recommend placing it in /usr/bin

Usage

$ python3 fisherman.py –help
usage: fisherman.py [-h] [–version] [-u USERNAME [USERNAME …] | -i ID
[ID …] | –use-txt TXT_FILE | -S USER] [-sf]
[–specify {0,1,2,3,4,5} [{0,1,2,3,4,5} …]] [-s] [-b]
[–email EMAIL] [–password PASSWORD] [-o] [-c] [-v | -q]
FisherMan: Extract information from facebook profiles. (Version 3.4.2)
optional arguments:
-h, –help show this help message and exit
–version Shows the current version of the program.
-u USERNAME [USERNAME …], –username USERNAME [USERNAME …]
Defines one or more users for the search.
-i ID [ID …], –id ID [ID …]
Set the profile identification number.
–use-txt TXT_FILE Replaces the USERNAME parameter with a user list in a
txt.
-S USER, –search USER
It does a shallow search for the username. Replace the
spaces with ‘.'(period).
-sf, –scrape-family If this parameter is passed, the information from
family members will be scraped if available.
–specify {0,1,2,3,4,5} [{0,1,2,3,4,5} …]
Use the index number to return a specific part of the
page. about: 0, about_contact_and_basic_info: 1,
about_family_and_relationships: 2, about_details: 3,
about_work_and_education: 4, about_places: 5.
-s, –several Returns extra data like profile picture, number of
followers and friends.
-b, –browser Opens the browser/bot.
–email EMAIL If the profile is blocked, you can define your
account, however you have the search user in your
friends list.
–password PASSWORD Set the password for your facebook account, this
parameter has to be used with –email.
-o, –file-output Save the output data to a .txt file.
-c, –compact Compress all .txt files. Use together with -o.
-v, -d, –verbose, –debug
It shows in detail the data search process.
-q, –quiet Eliminates and simplifies some script outputs for a
simpler and more discrete visualization.

To search for a user:

  • User name: python3 fisherman.py -u name name.profile name.profile2
  • ID: python3 fisherman.py -i 000000000000

The username must be found on the facebook profile link, such as:

https://facebook.com/name.profile/

It is also possible to load multiple usernames from a .txt file, this can be useful for a brute force output type:

python3 fisherman.py –use-txt filename.txt

Some profiles are limited to displaying your information for any account, so you can use your account to extract. Note: this should be used as the last hypothesis, and the target profile must be on your friends list:

python3 fisherman.py –email youremail@email.com –password yourpass

Some situations

  • For complete massive scrape:

python3 fisherman.py –use-txt file -o -c -sf

With a file with dozens of names on each line, you can make a complete “scan” taking your information and even your family members and will be compressed into a .zip at the output.

  • For specific parts of the account:
  • Basic data: python3 fisherman.py -u name --specify 0
  • Family and relationship: python3 -u name --specify 2
  • It is still possible to mix: python3 fisherman.py -u name --specify 0 2
  • To get additional things like profile picture, how many followers and how many friends:

python3 fisherman.py -u name [-s | –several]

  • For a short search by people’s name:

python3 fisherman.py [-S | –search] foo

Replace the spaces in the name with “.”(periods). The script returns around 30 profiles.

  • For a minimalist execution:

python3 fisherman.py [-q | –quiet]

Considerably reduces the script’s output texts and, by convention, improves performance.

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago