Ticker

6/recent/ticker-posts

Get Existing Accounts From Email OSINT Tool Eyes


There are many open-source intelligence tools on the Internet for finding information about a person's online presence on different social media accounts like
Sherlock and Userrecon. Still, sometimes we have to investigate an email address.

You may also like to read: All In One Facebook Toolkit For Information Gathering

In this article, we will learn how to get existing accounts from an Email with open-source intelligence (OSINT) tool known as Eyes on Kali Linux.

Eyes: Email OSINT Tool

It is based on an account search from an email address. Eyes can find if not only if an account in question with certain modules available in it even if the profile has nothing to do with the email.

Features

  • Full Async
  • Asynchrone Scraping
  • No target alert

Modules

Facial Recognition

Eyes also uses facial recognition in the GitHub module to study the profile picture (if available). The facial recognition module is called: Venom You will have the explanations of its operation in the file of Venom.

git clone https://github.com/N0rz3/Eyes.git
cd Eyes
pip3 install -r requirements.txt

Usage

usage: python eyes.py [-h] [-m] [email]

positional arguments:
  email          search information on the target email with modules, services...

options:
  -h, --help     show this help message and exit
  -m, --modules  gives you all the email modules used by Eyes

Demo



You may also like to read: Anonymous Instagram Password Cracking With Insta Breaker

I hope this information is helpful to you. Don't forget to bookmark future blogs on hacking and cybersecurity.

If you're passionate about learning to hack, give a try to our Hacking Like WatchDogs Course and get access to the latest practical hacking content.