Profil3r : OSINT Tool That Allows You To Find A Person’S Accounts And Emails + Breached Emails

Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses. This program also alerts you to the presence of a data leak for the found emails.

 Prerequisite

Installation

Install PyInquirer and jinja2 :

pip3 install PyInquirer jinja2

Install Profil3r :

git clone https://github.com/Rog3rSm1th/Profil3r.git
cd Profil3r/
sudo python3 setup.py install

Features

Domain

  • TLD (.com, .org, .net, etc…)

Emails

  • Data leaks
  • Emails

Social

  • Instagram
  • Facebook
  • Twitter
  • Tiktok
  • Pinterest
  • Linktr.ee
  • MySpace

Music

  • Soundcloud
  • Spotify

Programming

  • Github
  • Pastebin
  • Repl.it
  • Cracked.to

Forum

  • 0x00sec.org
  • Jeuxvideo.com
  • Hackernews

Tchat

  • Skype

Entertainment

  • Dailymotion
  • Vimeo

Porn

  • PornHub
  • RedTube
  • XVideos

Money

  • BuyMeACoffee

Report

JSON

A report in JSON format is automatically generated in the reports/json folder

HTML

A report in HTML format is automatically generated in the reports/html folder, you can access it in your webbrowser

The config.json file

You can modify the paths of the reports, the separators and the services Profil3r will search by default in the config.json file

FieldTypeDefaultDescription
report_elementsArray["email", "facebook", "twitter"]List of the services for which profil3r will search
json_report_pathString"./reports/json/{}.json"The path of the report’s JSON file, this path must include a {} which corresponds to the file name
html_report_pathString"./reports/html/{}.html"The path of the report’s HTML file, this path must include a {} which corresponds to the file name
separatorsObject{"Dot": ".", "Dash": "-", "Underscore": "_"}List of separators to separate items, for example: john.doe, john-doe, john_doe

Example

python3 profil3r.py john doe

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago