All Projects → sham00n → Buster

sham00n / Buster

Licence: gpl-3.0
An advanced tool for email reconnaissance

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Buster

Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+788.63%)
Mutual labels:  osint, recon, penetration-testing, infosec
frisbee
Collect email addresses by crawling search engine results.
Stars: ✭ 29 (-92.51%)
Mutual labels:  osint, emails, penetration-testing
Osint team links
Links for the OSINT Team
Stars: ✭ 378 (-2.33%)
Mutual labels:  osint, infosec, recon
flydns
Related subdomains finder
Stars: ✭ 29 (-92.51%)
Mutual labels:  osint, infosec, recon
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-34.88%)
Mutual labels:  osint, cybersecurity, recon
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (-29.46%)
Mutual labels:  osint, cybersecurity, penetration-testing
PyParser-CVE
Multi source CVE/exploit parser.
Stars: ✭ 25 (-93.54%)
Mutual labels:  osint, penetration-testing, infosec
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-56.33%)
Mutual labels:  osint, cybersecurity, recon
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-80.62%)
Mutual labels:  cybersecurity, penetration-testing, infosec
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-88.37%)
Mutual labels:  osint, cybersecurity, penetration-testing
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (-56.85%)
Mutual labels:  osint, penetration-testing, recon
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-88.89%)
Mutual labels:  osint, penetration-testing, infosec
Iky
OSINT Project
Stars: ✭ 203 (-47.55%)
Mutual labels:  osint, infosec, recon
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-90.18%)
Mutual labels:  osint, cybersecurity, infosec
Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+558.4%)
Mutual labels:  osint, penetration-testing, recon
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-63.31%)
Mutual labels:  penetration-testing, infosec, recon
Spaces Finder
A tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (-68.48%)
Mutual labels:  osint, infosec, recon
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (-68.22%)
Mutual labels:  osint, infosec, cybersecurity
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-92.51%)
Mutual labels:  osint, cybersecurity, penetration-testing
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-78.04%)
Mutual labels:  cybersecurity, infosec, recon

Description

Buster is an advanced OSINT tool used to:

  • Get social accounts of an email using multiple sources(gravatar,about.me,myspace,skype,github,linkedin,previous breaches)
  • Get links to where the email was found using google,twitter,darksearch and paste sites
  • Get breaches of an email
  • Get domains registered with an email (reverse whois)
  • Generate possible emails and usernames of a person
  • Find the email of a social media account
  • Find emails from a username
  • Find the work email of a person

A tutorial on how to use Buster can be found here

Installation

clone the repository:

$ git clone git://github.com/sham00n/buster

Once you have a copy of the source, you can install it with:

$ cd buster/
$ python3 setup.py install
$ buster -h

API keys

This project uses hunter.io to get information from company emails,the first couple "company email" searches dont require a key,if you have an interest in company emails i recommend that you sign up for an account on hunter.io.

Once you get an API key, add it to the file "api-keys.yaml" and rerun the command:

$ python setup.py install

Usage

usage: buster [-h] [-e EMAIL] [-f FIRST] [-m MIDDLE] [-l LAST] [-b BIRTHDATE]
              [-a ADDINFO [ADDINFO ...]] [-u USERNAME] [-c COMPANY]
              [-p PROVIDERS [PROVIDERS ...]] [-o OUTPUT] [-v] [--list LIST]

Buster is an OSINT tool used to generate and verify emails and return
information associated with them

optional arguments:
  -h, --help            show this help message and exit
  -e EMAIL, --email EMAIL
                        email adress or email pattern
  -f FIRST, --first FIRST
                        first name
  -m MIDDLE, --middle MIDDLE
                        middle name
  -l LAST, --last LAST  last name
  -b BIRTHDATE, --birthdate BIRTHDATE
                        birthdate in ddmmyyyy format,type * if you dont
                        know(ex:****1967,3104****)
  -a ADDINFO [ADDINFO ...], --addinfo ADDINFO [ADDINFO ...]
                        additional info to help guessing the
                        email(ex:king,345981)
  -u USERNAME, --username USERNAME
                        checks 100+ email providers for the availability of
                        [email protected]
  -c COMPANY, --company COMPANY
                        company domain
  -p PROVIDERS [PROVIDERS ...], --providers PROVIDERS [PROVIDERS ...]
                        email provider domains
  -o OUTPUT, --output OUTPUT
                        output to a file
  -v, --validate        check which emails are valid and returns information
                        of each one
  --list LIST           file containing list of emails


Usage examples

Get info of a single email(exists or not,social media where email was used,data breaches,pastes and links to where it was found)
$ buster -e [email protected]
Query for list of emails`
$ buster --list emails.txt
Generate emails that matches the pattern and checks if they exist or not(use the -a argument if you have more info to add(ex: -a nickname fav_color phone #)
$ buster -e j********[email protected]****.com -f john -l doe -b ****1989
Generate usernames (use with -o option and input the file to recon-ng's profiler module)
$ buster -f john -m james -l doe -b 13071989 
Generate emails (use -v if you want to validate and get info of each email)
$ buster -f john -m james -l doe -b 13071989 -p gmail.com yahoo.com
Generate 100+ emails in the format [email protected] and returns the valid ones(use -p if you dont want all 100+)
$ buster -u johndoe
Generate a company email and returns info associated with it
$ buster -f john -l doe -c company.com

Tips

  • You get 200 email validations/day,use them wisely!
  • When using the -a option,avoid using small words(ex:j,3,66),the shorter the words are the bigger the email list is and therefore more validations are needed
  • when adding an email pattern make sure the service providing the pattern displays it with the right size(facebook,twitter,instagram do...others might not)
  • I dont recommend using with Tor as haveibeenpwnd.com,hunter.io and google wont function properly

Thanks

  • emailrep.io for being developer friendly
  • khast3x,developer of h8mail which was used as a reference for this README file
  • The OSINT community for being awesome!

Notes

  • My Code is ugly,i know...if you know how to do things better let me know!
  • If you have any suggestions or improvements email me at sham00n at protonmail dot com

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].