ProtOSINT : Script Helps To Investigate Protonmail Accounts & ProtonVPN IP Addresses

ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.

Description

This tool can help you in your OSINT investigation on Proton service (for educational purposes only).
ProtOSINT is separated in 3 sub-modules:

  • [1] Test the validity of one protonmail account
  • [2] Try to find if your target have a protonmail account by generating multiple adresses by combining information fields inputted
  • [3] Find if your IP is currently affiliate to ProtonVPN

Prerequisite

Usage

python3 protosint.py

Protonmail

The account name in the protonmail is case-insensitive and ProtonMail considers the “.” “_” “-” symbols as transparent.
Additionnaly, any words put after a “+” sign are not taken into account.
It means that all of these email adresses below are the same as mikemike@protonmail.com:

All of these emails have the save timestamp and refers to the account mikemike@protonmail.com.

This technique does not always give you the creation time and date of the ProtonMail account itself, but the time and date when the email address itself was created (thanks to @sector035 for the tip: https://sector035.nl/articles/2020-50).

  • Email encryption keys

ProtOSINT allow you to know which encryption key is used for a protonmail account:

  • RSA 2048-bit (Older but faster) – high security
  • RSA 4096-bit (Secure but slow) – highest security
  • X25519 (Modern, fastest, secure) – State-of-the-art
R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 week ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

3 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

3 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

3 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

3 weeks ago