Email Finder/Extractor
by Alfuncoot - October 15, 2020 at 10:51 PM
#13
(October 19, 2020 at 10:33 AM)carnage00666 Wrote:
(October 17, 2020 at 10:11 PM)Alfuncoot Wrote:
(October 17, 2020 at 04:10 PM)carnage00666 Wrote:
(October 17, 2020 at 04:03 PM)cimutz007 Wrote:
(October 17, 2020 at 03:58 PM)carnage00666 Wrote: What type of tools?
I don't think there is a free tool that can bypass the instagram or facebook embedding algorithm

I told you, they scraping it using google dork. So they search social media account using google + keyword then they scrape the google result.

You can use
patterns such as on google:

• firstname.lastname [at][domain]

• firstname [at][domain]

• firstinitiallastname [at][domain]

• firstname_lastname [at][domain]

• Etc. through all the variations


Dorks operate on information that is visible, difficult to view, or on vulnerabilities in server settings.

But directly on instagram or facebook, at least today it is still not possible.


So you can operate with a filtered research.
So how exactly do people have their email doxed then because as it seems as long as you keep it private, no one will be able to find it.

mainly from data breaches.
Well I get that data breaches show emails, but let's say I had a target, I find it extremely unlikely I could find their exact email in a random leaked database.
Reply
#14
(October 19, 2020 at 06:26 PM)Alfuncoot Wrote:
(October 19, 2020 at 10:33 AM)carnage00666 Wrote:
(October 17, 2020 at 10:11 PM)Alfuncoot Wrote:
(October 17, 2020 at 04:10 PM)carnage00666 Wrote:
(October 17, 2020 at 04:03 PM)cimutz007 Wrote: I told you, they scraping it using google dork. So they search social media account using google + keyword then they scrape the google result.

You can use
patterns such as on google:

• firstname.lastname [at][domain]

• firstname [at][domain]

• firstinitiallastname [at][domain]

• firstname_lastname [at][domain]

• Etc. through all the variations


Dorks operate on information that is visible, difficult to view, or on vulnerabilities in server settings.

But directly on instagram or facebook, at least today it is still not possible.


So you can operate with a filtered research.
So how exactly do people have their email doxed then because as it seems as long as you keep it private, no one will be able to find it.

mainly from data breaches.
Well I get that data breaches show emails, but let's say I had a target, I find it extremely unlikely I could find their exact email in a random leaked database.


If you have a specif target, i can help you with osint research.
Send me a pvt msg.
Reply
#15
atomic email extractor
Reply

 Users browsing this thread: 1 Guest(s)