• We just launched and are currently in beta. Join us as we build and grow the community.

Profil3 – Find Potential Profiles of a Person

bluesone

Organic Traffic Architect
B Rep
0
0
0
Rep
0
B Vouches
0
0
0
Vouches
0
Posts
38
Likes
52
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Black-and-Yellow-Workout-Exercise-YouTube-Thumbnail-1.png


Hey Folks, in this tool tutorial we are going to present a profile based osint tool named “Profil3r“. Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses. This program also alerts you to the presence of a data leak for the found emails.

Let’s take a look 🙂 !!

Requirements

During the installation of this tool we will need the python utility, so it should be in your system and if you have not then you can install it using the following command.

apt install python3 python1apt install python3 python

Profil3r Tool Installation

Now is the right time to install this tool. We have given below three commands below which you have to execute simultaneously. After doing all this, you will be able to use this tool. If you find any error then you can contact us through the comment on the post.

git clone https://github.com/Rog3rSm1th/Profil3r.git
cd Profil3r/
python3 setup.py install123git clone
https://github.com/Rog3rSm1th/Profil3r.gitcd Profil3r/python3 setup.py install

1.png


Done 🙂 !! As always, this tool also has a help command that you can use to learn about the use of command’s that is in this tool.

python3 profil3r.py -h1python3 profil3r.py-h

2.png

Example – OSINT

Only we need to leave the name of the target in the command and it will keep asking us everything step by step. As soon as we execute the command we get a selective based interface where first we need to select the format for the user.
Usage 🙂 !! python3 profil3r.py -p < name >

python3 profil3r.py -p secnhack1python3 profil3r.py-psecnhack

3.png


Now we have to select a specific service and you can choose accordingly. But in our case we want to check the domain of the given name and its social profiles.

4.png


Good 🙂 !! As you can see how easily all social media profiles related to the domain have been dumped.

5.png

OSINT ( User Profiles )

We will implement the same procedure to find the user profile.

6.png


OK 🙂 !! Just move your cursor down and choose the social option.

7.png


Great 🙂 !! Now we get many profiles with the same name that we gave, so now you can open it one by one and get the exact profile.

8.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

440,010

316,559

316,568

Top