Disclaimer: This script is for educational purposes only. Do not use against any network, system or application that you don't own or have authorisation to test.
Licence : this project is under the MIT licence.
user-finder is a python script to automatically search to usernames online. It is a solo project that I (prc-github-prc) developed to help OSINT investigators or pentesters to find someone online. The way that the script work will be detailed later.
-windows : download the exe file for windows from the official website -linux (debian, ubuntu, kali...) : ```
sudo apt install git
-linux (arch) : ```
sudo pacman -S git
-windows : download the exe file from the official website (if pip is not directly installed with python, please consider searching solutions on internet)
-linux (debian, ubuntu, kali...) : ```
sudo apt install python3 python3-pip
-linux (arch) : ```
sudo pacman -S python3 python3-pip
-powershell or cmd for windows, bash or sh for linux : ```
pip install requests
or :
pip3 install requests
git clone https://www.github.com/prc-github-prc/user-finder/
cd user-finder
from the project clone directory (./automated-pages-explorer/) :
python finder.py <username> <sites list> <generation level> <save file (optional)>
or :
python3 finder.py <username> <sites list> <generation level> <save file (optional)>
This script work by generating a wordlist of usernames that are similar to the username provided by the script user (the level of generation can be choose : 1 = only provided username, 2 = + letters and numbers, 3 = + upcase, lowcase) and try them with a list of sites provided by user to (list.txt can be used). It can be useful to find "hidden accounts" because some people use differents but similar usernames with differents services.
If you want more details about how the script works, you can just read the code and the comments.