🔏
s0cm0nkey's Security Reference Guide
  • All of the Best Links and Resources on Cyber Security.
  • Cyber Intelligence
    • OSINT
      • Search Engines
        • Goohak.sh Code
        • Google Dorking
      • Cyber Search Engines
      • Dark-Web Search
      • IP Address
      • Domain
      • Username/Email
      • Name, Phone, Gov Record
      • SOCMINT - Social Media
      • Files/Media/Breach/Paste/Code
      • Misc OSINT
    • Intel Feeds and Sources
    • Threat Data
  • Red - Offensive Operations
    • Reconnaissance and Scanning
      • Recon Frameworks
      • NMAP
      • Burp Suite
      • Web App Testing Frameworks
      • Web App Scanning Utilities
    • Exploitation and Targets
      • Offensive Frameworks
      • Shells
      • MSFVenom Commands
      • Exploitation by Port
      • Web App Vulnerabilities
        • Broken Authentication
        • Business Logic Flaws
        • Clickjacking
        • Command Injection
        • CSRF
        • Deserialization
        • HTTP Host Header Attacks
        • HTTP Request Smuggling
        • Insecure Direct Object Reference
        • SQL Injection
          • SQL Tips and Tricks
          • SQL Basics
          • Manual Injection Methodology
        • Web Cache Poisoning
        • Web Sockets
        • XXE - XML External Entity Attacks
        • XSS Cross-Site Scripting
      • Web Technologies
        • SSL/TLS and Certificates
        • OAuth 2.0
        • Web Application Firewall
      • Special Targets
      • Exploit Dev/Buffer Overflow
    • Post Exploitation
      • C2 Frameworks
      • Persistence
      • Defense Evasion
      • Enumeration and Harvesting
      • File Transfer
      • Network Attacks /Harvesting/MITM
      • Privilege Escalation
      • Meterpreter Post-Auth Runbook
    • Attacking Active Directory
    • Lateral Movement
    • Password Attacks
    • Web App Hacking
    • Red/Purple Teaming
    • Physical Security Testing
    • Wireless Hacking
    • Social Engineering
    • Offensive Toolbox
      • Utility Commands
  • Blue - Defensive Operations
    • Standards, Frameworks, and Benchmarks
    • Query Languages
    • Event and Log analysis
    • Event Detection
      • SIEM and Enrichment
      • Sysmon
      • IDS/IPS
      • Detection Use Cases
        • DNS
        • HTTP(S)
        • Email
        • Endpoint
        • Command Line
        • Authentication/Logon
        • General Network Traffic
        • User Behavior monitoring
        • Detection Use Cases - Book Reference
        • Windows Event ID logging list
    • Packet Analysis
    • Threat Hunting
    • Active Defense
    • Device Auditing and Hardening
      • Windows Hardening Commands
      • AD Security Checks
    • Stegonography
    • Asset and Vulnerability Management.
    • Blue ToolBox
  • Blue - DFIR: Digital Forensics and Incident Response
    • Interact with remote machine
    • Windows System Enumeration
    • Windows Process Information
    • Windows DFIR Checks
    • Windows DFIR Check by MITRE Tactic
    • Windows Event Logs
    • Windows Remediation Commands
    • IR Event Log Cheatsheet
    • Linux DFIR Commands
    • MacOS DFIR Commands
    • YARA
    • Memory Forensics
      • Volatility
    • Sandboxing
    • File/Binary Analysis
    • Malware
    • Reverse Engineering
  • Yellow - NetEng/SysAdmin
  • Yellow - Logging and Security Architecture
    • How create a logging strategy
    • Logging - Network Services
    • Logging - Endpoint Logs
    • Logging - User Behavior Monitoring
    • Logging - Cloud
    • Device Discovery and Asset Monitoring
    • Log Source Evaluation
  • Yellow - Cloud
  • Yellow - Containers
  • Yellow - Code and CLI
    • Bash
      • CLI Components
      • Common Commands
      • Install Scripts
      • NMAP Diffing
      • Heartbleed Vuln Check
    • Powershell
      • Common Commands
    • Regex
    • Learn to Code
  • Yellow - AI, Machine Learning, and FOSS
  • Grey - Privacy/TOR/OPSEC
    • Jolly Roger's Security for Beginners
    • PGP Guide
    • TOR
  • Training and Resources
    • Cyber Security Certifications
      • OSCP
    • Books and Reading
    • The Awesome Lists
    • Practice Lab
    • CTF
Powered by GitBook
On this page
  • Usernames and Email Addresses
  • Username and Email Address Analysis Tools
  • Investigation MindMaps

Was this helpful?

  1. Cyber Intelligence
  2. OSINT

Username/Email

PreviousDomainNextName, Phone, Gov Record

Last updated 2 years ago

Was this helpful?

Usernames and Email Addresses

Corporate usernames are beginning to be obnoxiously easy to guess and build. The standard of FIRSTNAME.LASTNAME@CORP.com is so common, it's ridiculous. Even more so when account management tools will simply take the first half of the email and reuse it as a username. We can use schemes like this to our advantage to search for a multitude of treasures like accounts on other services with the same username, credentials found in breaches, and associated sites or tools. When searching for usernames, you can uncover linked social media accounts and tons of relevant intelligence.

Username and Email Address Analysis Tools

Username.html and Email.html

These two tools often go hand in hand with results often overlapping. Still, it is good habit to run the searches for both the username and the email address in case there is a discrepancy between the two. These two tools check for two things: presence of the username/email on a given platform, and any public/leaked info connected to them.

Username Search Tools
  • - This tool allows you to enumerate usernames across many different websites.

  • - Search Engine for Usernames

  • - Search tool specifically for names

  • - See if a username is available across multiple platforms

  • - Hunt down social media accounts by username across

  • - OSINT tool for automated scanning of social networks and other websites, using a single nickname.

  • - Find usernames across over 75 social networks

  • - Python library and CLI for accurately querying username and email usage on online platforms.

  • - Social media username checker. Gather information on the taken username and get a summary of who the person is.

  • - A free people search engine that organizes social network information, deep web information, phone numbers, email addresses and more.

  • - Allows you to check for a username or real name instantly on over 500 popular and emerging social media sites.

Email Address Search Tools
Email Address Enumeration Tools

For when you have your target but not their email address

Email Verification Tools

Some times it helps to perform a quick check to see if an email is even valid or registered.

CLI Email Intelligence Tools

Investigation MindMaps

- Search public email records for a given email address.

- Collection of online tools that can gather multiple points of data surrounding an email address or domain.

- Enrich user data based on a single email address.

- Enter an email address and see which sites the email address has been used.

- Search EmailCrawlr for email addresses and phone numbers associated with a domain.

- Discover email addresses by company name

- Phonebook lists all domains, email addresses, or URLs for the given input domain.

- Discover email addresses by company name

- Powerful email discovery tool, only works in chrome.

- Find the email address format for a given company or domain.

- Locate employee email addresses via domain name. Very handy.

- Prevent bounced emails and low-quality users with free professional grade email verification

- Email address verification technology from Email Hippo that connects to mailboxes and checks whether an email address exists.

- This email verification tool actually connects to the mail server and checks whether the mailbox exists or not.

- Email Checker ensures that an email address is correct and active in real-time without ever needing to send a message.

- This tool is the defacto standard for email intelligence gathering. It checks a large array of sources to pull together information. It can leverage APIs of other services such as Spyse or Shodan to improve the search. Remember these will require an API key to use. I have found that between the above html tools and this, it will satisfy your email searching needs.

- Infoga is a tool gathering email accounts information (ip,hostname,country,...) from different public source (search engines, pgp key servers and shodan) and check if emails was leaked using haveibeenpwned.com API.

- email2phonenumber is an OSINT tool that allows you to obtain a target's phone number just by having his email address.

- Google account info scraper

- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email

- Search emails from a domain through search engines

Public Mail Records
MXToolBox
https://seon.io/intelligence-tool/#email-analysis-module
https://tools.epieos.com/email.php
https://github.com/megadose/holehe
https://emailcrawlr.com/
https://hunter.io/
https://phonebook.cz/
https://www.voilanorbert.com/
https://connect.clearbit.com/
Email Format
https://snov.io/email-finder
Tru Mail
Email Hippo
Verify email
Email Checker
TheHarvester
Infoga
Match Email to Phone number
GHunt
h8mail
https://hakin9.org/h8mail-email-osint-password-breach-hunting-tool-locally-or-using-premium-services/
EmailFinder
https://whatsmyname.app/
https://github.com/WebBreacher/WhatsMyName
https://usersearch.org/
Lullar search
Name Check
Sherlock
social networks
https://www.kali.org/tools/sherlock/
Stalker
finduser
socialscan
https://analyzeid.com/username/
https://www.idcrawl.com/
https://knowem.com/
21KB
Username.html
13KB
Email.html