NOTE: tor service must be up and running to be connected to port 9050Ĭlone the repository using Git: git clone The installation of Tor depends on your system. In addition, for each email a POST request is made to HaveIBeenPwned to find out the source of the leak. PwnDB: Inspired by the tool PwnDB created by a module has been developed that searches for all credential leaks from the emails found.Twint: Using Twint from you can track all the Tweets published by a user looking for some email.In addition, it is possible to add the employees found to your contacts, so that you can later have access to their network of contacts and information. Linkedin: Using unofficial Linkedin API, different methods were developed to obtain a company’s employees and their contact information (email, twitter or phone).Instragram: Making use of the unofficial Instagram API from different methods were developed to obtain the emails published by users.
0 Comments
Leave a Reply. |