Kali Linux

Socid-Extractor : Extract Accounts Info From Personal Pages On Various Sites For OSINT Purpose

Socid-Extractor Extracts information about a user from profile webpages / API responses and save it in machine-readable format.

Usage

As a command-line tool:

$ socid_extractor –url https://www.deviantart.com/muse1908
country: France
created_at: 2005-06-16 18:17:41
gender: female
username: Muse1908
website: www.patreon.com/musemercier
links: [‘https://www.facebook.com/musemercier’, ‘https://www.instagram.com/muse.mercier/’, ‘https://www.patreon.com/musemercier’]
tagline: Nothing worth having is easy…

Without installing:

$ ./run.py –url https://www.deviantart.com/muse1908

As a Python library:

import socid_extractor, requests
r = requests.get(‘https://www.patreon.com/annetlovart’)
socid_extractor.extract(r.text)
{‘patreon_id’: ‘33913189’, ‘patreon_username’: ‘annetlovart’, ‘fullname’: ‘Annet Lovart’, ‘links’: “[‘https://www.facebook.com/322598031832479’, ‘https://www.instagram.com/annet_lovart’, ‘https://twitter.com/annet_lovart’, ‘https://youtube.com/channel/UClDg4ntlOW_1j73zqSJxHHQ’]”}

Installation

$ pip3 install socid-extractor

The latest development version can be installed directly from GitHub:

$ pip3 install -U git+https://github.com/soxoj/socid_extractor.git

Sites and Methods

More than 100 methods for different sites and platforms are supported!

  • Google (all documents pages, maps contributions), cookies required
  • Yandex (disk, albums, znatoki, music, realty, collections), cookies required to prevent captcha blocks
  • Mail.ru (my.mail.ru user mainpage, photo, video, games, communities)
  • Facebook (user & group pages)
  • VK.com (user page)
  • OK.ru (user page)
  • Instagram
  • Reddit
  • Medium
  • Flickr
  • Tumblr
  • TikTok
  • GitHub

…and many others.

You can also check tests file for data examples, schemes file to expore all the methods.

When it may be useful

  • Getting all available info by the username or/and account UID. Examples: Week in OSINT, OSINTCurious
  • Users tracking, checking that the account was previously known (by ID) even if all public info has changed. Examples: Aware Online
  • Searching by commonly used cross-service UIDs (GAIA ID, Facebook UID, Yandex Public ID, etc.)
    • DB leaks of forums and platforms in SQL format
    • Indexed links that contain target profile ID
  • Searching for tracking data by comparison with other IDs – how it works, how can it be used.
  • Law enforcement online requests

Testing

python3 -m pytest tests/test_e2e.py -n 10 -k ‘not cookies’ -m ‘not github_failed and not rate_limited’

R K

Recent Posts

Kali Linux 2024.4 Released, What’s New?

Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…

12 hours ago

Lifetime-Amsi-EtwPatch : Disabling PowerShell’s AMSI And ETW Protections

This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…

12 hours ago

GPOHunter – Active Directory Group Policy Security Analyzer

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…

2 days ago

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection & Protection

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…

5 days ago

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

1 week ago

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don't worry if there are any bugs in the tool, we will try to fix…

1 week ago