A clean, fast, and colorful OSINT utility for enumerating usernames across many platforms.
Features an animated rainbow ASCII banner, concurrent lookups, Google dork search support, and automatic result saving.
When run, the tool shows an animated rainbow ASCII banner and a simple menu:
[ animated rainbow banner ]
[ MENU ]
1. Google Dork Search
2. Username Lookup
3. Exit
Example output after choosing "Username Lookup" for DotX-47:
Select an option: 2
Enter the username to check: DotX-47
[+] Found: https://github.com/DotX-47
[-] Not found: https://www.instagram.com/DotX-47/
[-] Not found: https://x.com/DotX-47
Results saved to Doxed/DotX-47.txt
- 🔎 Username lookup across many popular platforms (25+)
- 🌐 Simple Google Dork scraping option
- ⚡ Multi-threaded checks (fast)
- 🌈 Animated rainbow ASCII banner at startup
- 💾 Automatically saves positive results in
Doxed/<username>.txt - ✨ Lightweight, terminal-first UX
YouTube, TikTok, Instagram, Facebook, X (Twitter), GitHub, GitLab, Reddit, Steam, SoundCloud, Pastebin, Telegram, Keybase, Pinterest, Behance, Dribbble, DeviantArt, LinkedIn, Twitch, VK, OK.ru, and more.
Note: exact coverage depends on the script version/URL list. Some services have numeric ID-based profiles or rate limits that require custom checks.
- Python 3.8+
- The following Python packages:
requests
beautifulsoup4
pyfiglet
colorama
requirements.txt contents :
requests>=2.28.0
beautifulsoup4>=4.12.0
pyfiglet>=0.8.post1
colorama>=0.4.6
You can install dependencies with:
pip install -r requirements.txtor
pip install requests beautifulsoup4 pyfiglet colorama- Clone this repository:
git clone https://github.com/DotX-47/OSINT-V1
cd User-Search- (Optional) Create and activate a virtual environment:
python3 -m venv venv
source venv/bin/activate # Linux / macOS
venv\Scripts\activate # Windows (PowerShell)- Install dependencies:
pip install -r requirements.txt- Run the tool:
python3 Users-Dorks.pyIf your terminal supports ANSI colors, you’ll see the animated rainbow banner. If you run into issues on Windows, use a modern terminal (Windows Terminal / PowerShell) or WSL.
The script is interactive. Choose from the menu:
- Google Dork Search — enter a Google dork query string and the script will attempt to return search results (HTML scraping; may break if Google changes layout or blocks the request).
- Username Lookup — enter a username string (e.g.,
DotX-47) and the tool will probe a curated list of profile URLs in parallel. Positive hits are shown and saved in theDoxed/directory. - Exit — quit the program.
1. Google Dork Search
2. Username Lookup
3. Exit
Select an option: 2
Enter the username to check: DotX-47
[+] Found: https://github.com/DotX-47
[-] Not found: https://www.instagram.com/DotX-47/
Results saved to Doxed/DotX-47.txt
- All positive findings are written to
Doxed/<username>.txt. - Each saved file contains one discovered profile URL per line.
This tool is provided for ethical use cases such as:
- authorized penetration testing,
- personal account discovery,
- digital footprinting,
- red team exercises, and
- cybersecurity research.
You must have explicit permission to investigate a target.
Do NOT use this tool for harassment, stalking, privacy invasion, or any illegal activity.
The author (DotX-47) assumes no responsibility for misuse. Use at your own risk.
DotX-47 — Cybersecurity & OSINT Enthusiast
- Star the repo on GitHub
- Share with fellow OSINT/cybersec folks
- Suggest improvements via Issues / Pull Requests