Skip to content

OSINT-V1 is a fast, interactive, and colorful Python 3 utility developed by DotX-47 for Open-Source Intelligence (OSINT). Its primary function is to perform rapid, concurrent enumeration of a target username across a wide range of social media and online platforms.

Notifications You must be signed in to change notification settings

DotX-47/OSINT-V1

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🕵️‍♂️ User-Search – Made By DotX-47

A clean, fast, and colorful OSINT utility for enumerating usernames across many platforms.
Features an animated rainbow ASCII banner, concurrent lookups, Google dork search support, and automatic result saving.


🌈 Quick preview

Screenshot When run, the tool shows an animated rainbow ASCII banner and a simple menu:

[ animated rainbow banner ]
[ MENU ]
1. Google Dork Search
2. Username Lookup
3. Exit

Example output after choosing "Username Lookup" for DotX-47:

Select an option: 2
Enter the username to check: DotX-47

[+] Found: https://github.com/DotX-47
[-] Not found: https://www.instagram.com/DotX-47/
[-] Not found: https://x.com/DotX-47
Results saved to Doxed/DotX-47.txt

🚀 Features

  • 🔎 Username lookup across many popular platforms (25+)
  • 🌐 Simple Google Dork scraping option
  • ⚡ Multi-threaded checks (fast)
  • 🌈 Animated rainbow ASCII banner at startup
  • 💾 Automatically saves positive results in Doxed/<username>.txt
  • ✨ Lightweight, terminal-first UX

🧩 Platforms checked (examples)

YouTube, TikTok, Instagram, Facebook, X (Twitter), GitHub, GitLab, Reddit, Steam, SoundCloud, Pastebin, Telegram, Keybase, Pinterest, Behance, Dribbble, DeviantArt, LinkedIn, Twitch, VK, OK.ru, and more.

Note: exact coverage depends on the script version/URL list. Some services have numeric ID-based profiles or rate limits that require custom checks.


⚙️ Requirements

  • Python 3.8+
  • The following Python packages:
requests
beautifulsoup4
pyfiglet
colorama

requirements.txt contents :

requests>=2.28.0
beautifulsoup4>=4.12.0
pyfiglet>=0.8.post1
colorama>=0.4.6

You can install dependencies with:

pip install -r requirements.txt

or

pip install requests beautifulsoup4 pyfiglet colorama

🧭 Installation & Run

  1. Clone this repository:
git clone https://github.com/DotX-47/OSINT-V1
cd User-Search
  1. (Optional) Create and activate a virtual environment:
python3 -m venv venv
source venv/bin/activate   # Linux / macOS
venv\Scripts\activate      # Windows (PowerShell)
  1. Install dependencies:
pip install -r requirements.txt
  1. Run the tool:
python3 Users-Dorks.py

If your terminal supports ANSI colors, you’ll see the animated rainbow banner. If you run into issues on Windows, use a modern terminal (Windows Terminal / PowerShell) or WSL.


🧠 Usage

The script is interactive. Choose from the menu:

  1. Google Dork Search — enter a Google dork query string and the script will attempt to return search results (HTML scraping; may break if Google changes layout or blocks the request).
  2. Username Lookup — enter a username string (e.g., DotX-47) and the tool will probe a curated list of profile URLs in parallel. Positive hits are shown and saved in the Doxed/ directory.
  3. Exit — quit the program.

Example

1. Google Dork Search
2. Username Lookup
3. Exit
Select an option: 2
Enter the username to check: DotX-47
[+] Found: https://github.com/DotX-47
[-] Not found: https://www.instagram.com/DotX-47/
Results saved to Doxed/DotX-47.txt

📝 Saving & Output

  • All positive findings are written to Doxed/<username>.txt.
  • Each saved file contains one discovered profile URL per line.

⚖️ Legal & Ethical Notice (READ THIS)

This tool is provided for ethical use cases such as:

  • authorized penetration testing,
  • personal account discovery,
  • digital footprinting,
  • red team exercises, and
  • cybersecurity research.

You must have explicit permission to investigate a target.
Do NOT use this tool for harassment, stalking, privacy invasion, or any illegal activity.

The author (DotX-47) assumes no responsibility for misuse. Use at your own risk.




✉️ Contact / Author

DotX-47 — Cybersecurity & OSINT Enthusiast


⭐ If you like this project

  • Star the repo on GitHub
  • Share with fellow OSINT/cybersec folks
  • Suggest improvements via Issues / Pull Requests

About

OSINT-V1 is a fast, interactive, and colorful Python 3 utility developed by DotX-47 for Open-Source Intelligence (OSINT). Its primary function is to perform rapid, concurrent enumeration of a target username across a wide range of social media and online platforms.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages