ProtOSINT : Script Helps To Investigate Protonmail Accounts & ProtonVPN IP Addresses

ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.

Description

This tool can help you in your OSINT investigation on Proton service (for educational purposes only).
ProtOSINT is separated in 3 sub-modules:

  • [1] Test the validity of one protonmail account
  • [2] Try to find if your target have a protonmail account by generating multiple adresses by combining information fields inputted
  • [3] Find if your IP is currently affiliate to ProtonVPN

Prerequisite

Usage

python3 protosint.py

Protonmail

The account name in the protonmail is case-insensitive and ProtonMail considers the “.” “_” “-” symbols as transparent.
Additionnaly, any words put after a “+” sign are not taken into account.
It means that all of these email adresses below are the same as mikemike@protonmail.com:

All of these emails have the save timestamp and refers to the account mikemike@protonmail.com.

This technique does not always give you the creation time and date of the ProtonMail account itself, but the time and date when the email address itself was created (thanks to @sector035 for the tip: https://sector035.nl/articles/2020-50).

  • Email encryption keys

ProtOSINT allow you to know which encryption key is used for a protonmail account:

  • RSA 2048-bit (Older but faster) – high security
  • RSA 4096-bit (Secure but slow) – highest security
  • X25519 (Modern, fastest, secure) – State-of-the-art
R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

7 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago