All Projects → 9b → frisbee

9b / frisbee

Licence: MIT license
Collect email addresses by crawling search engine results.

Programming Languages

python
139335 projects - #7 most used programming language
Batchfile
5799 projects
Makefile
30231 projects

Projects that are alternatives of or similar to frisbee

Buster
An advanced tool for email reconnaissance
Stars: ✭ 387 (+1234.48%)
Mutual labels:  osint, emails, penetration-testing
Linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+1637.93%)
Mutual labels:  osint, penetration-testing
Whatbreach
OSINT tool to find breached emails, databases, pastes, and relevant information
Stars: ✭ 472 (+1527.59%)
Mutual labels:  osint, emails
Holehe
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
Stars: ✭ 568 (+1858.62%)
Mutual labels:  osint, emails
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+1289.66%)
Mutual labels:  osint, penetration-testing
Cloud enum
Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.
Stars: ✭ 420 (+1348.28%)
Mutual labels:  osint, penetration-testing
Theharvester
E-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+21193.1%)
Mutual labels:  osint, emails
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+11593.1%)
Mutual labels:  osint, penetration-testing
Dot
Darknet OSINT Transform
Stars: ✭ 93 (+220.69%)
Mutual labels:  osint, emails
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (+262.07%)
Mutual labels:  osint, penetration-testing
Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+8686.21%)
Mutual labels:  osint, penetration-testing
osint
Docker image for osint
Stars: ✭ 92 (+217.24%)
Mutual labels:  osint, harvester
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (+975.86%)
Mutual labels:  osint, penetration-testing
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+1372.41%)
Mutual labels:  osint, penetration-testing
Sonarsearch
A MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (+924.14%)
Mutual labels:  osint, penetration-testing
Awesome Termux Hacking
⚡️An awesome list of the best Termux hacking tools
Stars: ✭ 509 (+1655.17%)
Mutual labels:  osint, penetration-testing
DaProfiler
DaProfiler allows you to create a profile on your target based in France only. The particularity of this program is its ability to find the e-mail addresses your target.
Stars: ✭ 58 (+100%)
Mutual labels:  osint, emails
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (+48.28%)
Mutual labels:  osint, penetration-testing
Intrigue Core
Discover Your Attack Surface!
Stars: ✭ 1,013 (+3393.1%)
Mutual labels:  osint, penetration-testing
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+11758.62%)
Mutual labels:  osint, penetration-testing

Frisbee

https://readthedocs.org/projects/frisbee/badge/?version=latest

Frisbee is a small utility to collect email addresses from search engines and other free-form text sources. Frisbee makes it simple to find email addresses posted on the web by taking user-fed input and translating it into an automated search query. Users can extend frisbee by adding modules for new search engines or other obscure data sources.

Quick Start

Install the library:

pip install frisbee or python setup.py install

Run a search

frisbee search -e bing -d bnpparibas.com -l 50 --greedy --save

Search in bulk

frisbee search -e bing -f domains -l 50 --save

Sample Code

This sample code shows some of the range of functionality within the module:

from frisbee import Frisbee

# Create an instance
frisbee = Frisbee(save=True)

# Describe your job
jobs = [{'engine': 'bing', 'modifier': 'site:github.com',
         'domain': 'foo.bar', 'limit': 50}]

# Execute the jobs
frisbee.search(jobs)

# Get the results
results = frisbee.get_results()

Example Output

Below is an example job result:

[{
    "engine": "bing",
    "modifier": "site:github.com",
    "domain": "blockade.io",
    "limit": 50,
    "results": {
        "start_time": "2018-12-13 16:54:15",
        "end_time": "2018-12-13 16:54:19",
        "emails": [
            "[email protected]"
        ],
        "duration": "4",
        "processed": 44
    },
    "project": "zealous_kirch"
}]

Features

  • Ability to search for email addresses from search engine results
  • Modular design that can be extended easily to include new sources
  • Modifier options that can filter or target search query
  • Limit option to reduce the number of results parsed
  • Greedy option to learn from collected results and fuzzy to find related
  • Save output describing job request and results
  • Individual or bulk look-ups using the command line utility

Changelog

05-30-19

  • Feature: Added a bulk option to the command line tool to ease usage
  • Change: Replaced multiprocessing with concurrent.futures to simplify logic
  • Change: Split logic of dynamic module loading and future work outside of the Frisbee class
  • Change: Reverted back to the BS4 parsing versus raw text
  • Change: Replaced the regular expression processing to be more efficient
  • Change: Progressively save results as they come in to avoid any losses from a deadlock
  • Change: Randomize the top-level directory to avoid conflicts

05-24-19

  • Feature: Clean SERPs to remove files or other formats we can't inspect
  • Change: Use text extraction instead of BS4 HTML parsing to get body of websites (ensures clean email extraction)
  • Change: Increased logging and timeout parameters

12-20-18

  • Feature: Added typing to the core code
  • Feature: Added a fuzzy flag to find related domains

12-14-18

  • Feature: Activated greedy option to save and output to screen
  • Bugfix: Wrapped loading of HTML for cases where data is dirty

12-13-18

  • Initial push!
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].