• Stars
    star
    11,527
  • Rank 2,875 (Top 0.06 %)
  • Language
    JavaScript
  • License
    GNU Affero Genera...
  • Created almost 4 years ago
  • Updated 29 days ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites

Social Analyzer - API, CLI, and Web App for analyzing & finding a person's profile across +1000 social media \ websites. It includes different analysis and detection modules, and you can choose which modules to use during the investigation process.

The detection modules utilize a rating mechanism based on different detection techniques, which produces a rate value that starts from 0 to 100 (No-Maybe-Yes). This module is intended to have fewer false positives.

The analysis and public extracted information from this OSINT tool could help investigate profiles related to suspicious or malicious activities such as cyberbullying, cyber grooming, cyberstalking, and spreading misinformation.

This project is currently used by some law enforcement agencies in countries where resources are limited - The detection database is different than the one shared here..

So·cial Me·di·a

Websites and applications that enable users to create and share content or to participate in social networking - Oxford Dictionary

Structure

APP (Preferred!)

Standard localhost WEB APP url: http://0.0.0.0:9005/app.html

CLI

Features

  • String & name analysis (Permutations and Combinations)
  • Find a profile using multiple techniques (HTTPS library & Webdriver)
  • Multi profile search (Used for correlation - any combination separated with "," )
  • Multilayers detections (OCR, normal, advanced & special)
  • Visualized profile information using Ixora (Metadata & Patterns)
  • Metadata & Patterns extraction (Added from Qeeqbox OSINT project)
  • Force-directed Graph for Metadata (Needs ExtractPatterns)
  • Search by top ranking or by country (Alexa Ranking)
  • Search by type (adult, music, etc.. - automated websites stats)
  • Profiles stats and static info (Category country)
  • Cross Metadata stats (Added from Qeeqbox OSINT project)
  • Auto-flirtation to unnecessary output (Enable javascript etc..)
  • Search engine lookup (Google API - optional)
  • Custom search queries (Google API & DuckDuckGo API - optional)
  • Profile screenshot, title, info, and website description
  • Find name origins, name similarity & common words by language
  • Find possible profile\person age (Limited analysis)
  • Custom user-agent, proxy, timeout & implicit wait
  • Python CLI & NodeJS CLI (limited to FindUserProfilesFast option)
  • Screenshots of detected profile (The latest version of Chrome must be installed)
  • Grid option for faster checking (limited to docker-compose)
  • Dump logs to folder or terminal (prettified)
  • Adjust finding\getting profile workers (default 15)
  • Re-checking option for failed profiles
  • Filter profiles by good, maybe, and bad
  • Save the analysis as a JSON file
  • Simplified web interface and CLI
  • And, more!!

Special Detections

Install & Run

Linux (As Node WebApp)

sudo apt-get update
#Depedning on your Linux distro, you may or may not need these 2 lines
sudo DEBIAN_FRONTEND=noninteractive apt-get install -y software-properties-common
sudo add-apt-repository ppa:mozillateam/ppa -y
sudo apt-get install -y firefox-esr tesseract-ocr git nodejs npm
git clone https://github.com/qeeqbox/social-analyzer.git
cd social-analyzer
npm update
npm install
npm install loadash
npm start

Linux (As Node CLI)

sudo apt-get update
#Depedning on your Linux distro, you may or may not need these 2 lines
sudo DEBIAN_FRONTEND=noninteractive apt-get install -y software-properties-common
sudo add-apt-repository ppa:mozillateam/ppa -y
sudo apt-get install -y firefox-esr tesseract-ocr git nodejs npm
git clone https://github.com/qeeqbox/social-analyzer.git
cd social-analyzer
npm install
npm install loadash
nodejs app.js --username "johndoe"
#or
nodejs app.js --username "johndoe,janedoe" --metadata
#or
nodejs app.js --username "johndoe,janedoe" --metadata --top 100
#or
nodejs app.js --username "johndoe" --type "adult"

Linux (As python package)

sudo apt-get update
sudo apt-get install python3 python3-pip
pip3 install social-analyzer
python3 -m social-analyzer --username "johndoe"
#or
python3 -m social-analyzer --username "johndoe" --metadata
#or
python3 -m social-analyzer --username "johndoe" --metadata --top 100
#or
python3 -m social-analyzer --username "johndoe" --type "adult"
#or
python3 -m social-analyzer --username "johndoe" --websites "car" --logs --screenshots

Linux (As python script)

sudo apt-get update
sudo apt-get install git python3 python3-pip
git clone https://github.com/qeeqbox/social-analyzer
cd social-analyzer
pip3 install -r requirements.txt
python3 app.py --username "janedoe"
#or
python3 app.py --username "johndoe" --metadata
#or
python3 app.py --username "johndoe" --metadata --top 100
#or
python3 app.py --username "johndoe" --type "adult"
#or
python3 app.py --username "johndoe" --websites "car" --logs --screenshots

Importing as object (python)

#E.g. #1
from importlib import import_module
SocialAnalyzer = import_module("social-analyzer").SocialAnalyzer()
results = SocialAnalyzer.run_as_object(username="johndoe",silent=True)
print(results)

#E.g. #2
from importlib import import_module
SocialAnalyzer = import_module("social-analyzer").SocialAnalyzer()
results = SocialAnalyzer.run_as_object(username="johndoe,janedoe",silent=True,output="json",filter="good",metadata=False,timeout=10, profiles="detected")
print(results)

Linux, Windows, MacOS, Raspberry pi..

  • check this wiki for all possible installation methods
  • check this wiki for integrating social-analyzer with your OSINT tools, feeds, etc...

social-analyzer --h

Required Arguments:
  --username   E.g. johndoe, john_doe or johndoe9999

Optional Arguments:
  --websites    A website or websites separated by space E.g. youtube, tiktokor tumblr
  --mode        Analysis mode E.g.fast -> FindUserProfilesFast, slow -> FindUserProfilesSlow or special -> FindUserProfilesSpecial
  --output      Show the output in the following format: json -> json outputfor integration or pretty -> prettify the output
  --options     Show the following when a profile is found: link, rate, titleor text
  --method      find -> show detected profiles, get -> show all profiles regardless detected or not, all -> combine find & get
  --filter      Filter detected profiles by good, maybe or bad, you can do combine them with comma (good,bad) or use all
  --profiles    Filter profiles by detected, unknown or failed, you can do combine them with comma (detected,failed) or use all
  --countries   select websites by country or countries separated by space as: us br ru
  --type        Select websites by type (Adult, Music etc)
  --top         select top websites as 10, 50 etc...[--websites is not needed]
  --extract     Extract profiles, urls & patterns if possible
  --metadata    Extract metadata if possible (pypi QeeqBox OSINT)
  --trim        Trim long strings
  --gui         Reserved for a gui (Not implemented)
  --cli         Reserved for a cli (Not needed)

Listing websites & detections:
  --list        List all available websites

Setting:
  --headers     Headers as dict
  --logs_dir    Change logs directory
  --timeout     Change timeout between each request
  --silent      Disable output to screen

Open Shell

Open in Cloud Shell Open in repl.it Shell

Resources

  • DuckDuckGo API, Google API, NodeJS, bootstrap, selectize, jQuery, Wikipedia, font-awesome, selenium-webdriver & tesseract.js
  • Let me know if I missed a reference or resource!

Interviews

Some News\Articles

  • Social Analyzer is in a league of its own and is a very impressive tool that I thoroughly recommend for Digital Investigators and OSINT practitioners - by Joseph Jones, Founder of Strategy Nord, Unita Insight and OS2INT, INVESTIGATING USERNAMES WITH SOCIAL ANALYZER
  • Advanced OSINT: The Art of Pivoting by hatless1der
  • Hakin9 - Social-Analyzer
  • b-son.net
  • esgeeks
  • Most advanced OSINT tool for investigating usernames (Open-Source)
  • 5 Advance Open-Source Intelligence (OSINT) Tools
  • 5 Open-Source Intelligence (OSINT) GitHub Repositories For Every Security Analyst (Cyber Security)
  • You can use social-analyzer in the BlackArch penetration testing distribution by installing blackarch-social

Disclaimer\Notes

  • Download this project from GitHub and treat it as a security project
  • If you want your website to be excluded from this project list, please reach out to me
  • This tool is meant to be used locally, not as a service (It does not have any Access Control)
  • For issues related to modules that end with -private or under the private group , reach out directly to me (do not open an issue on GitHub)

Other Projects

More Repositories

1

honeypots

30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
Python
666
star
2

chameleon

19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
Dockerfile
657
star
3

analyzer

Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)
Python
267
star
4

url-sandbox

Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
Python
167
star
5

raven

Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
JavaScript
159
star
6

docker-images

Kali and Parrot OS docker images accessible via VNC, RDP and Web
Dockerfile
111
star
7

mitre-visualizer

🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Python
86
star
8

osint

Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) with this python package
Python
79
star
9

rhino

Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
JavaScript
62
star
10

woodpecker

Custom security distro for remote penetration testing
51
star
11

seahorse

ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)
Python
45
star
12

image-analyzer

Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)
HTML
24
star
13

octopus

Pure Honeypots with an automated bash script
Shell
19
star
14

cyber-attacks

A collection of attacks metadata that were used in my previous pen-test tools
17
star
15

reports

Recent cyber attacks reports & interesting analysis files
15
star
16

APT-Malware-Reports-Set-1

Some extracted Features\IoCs\Artifacts\Patterns from APT Malware
HTML
14
star
17

pentest-labs

HTML
14
star
18

falcon

Collection of exploits that were verified by an automated system
13
star
19

two-factor-authentication-sim-swapping

An adversary may utilize a sim swapping attack for defeating 2fa authentication
11
star
20

worldmap

An interactive world-map that has been used in live Cyber Threat interfaces
JavaScript
11
star
21

two-factor-authentication-sim-cloning

An adversary may utilize a sim swapping attack for defeating 2fa authentication
11
star
22

threat-intelligence

Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, and future cyber threats (Collecting information about a potential threat, then analyzing that information to learn more about the negative events)
9
star
23

cyber-kill-chain

Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks
7
star
24

ixora

Internal package for visualization
HTML
6
star
25

world-json

Multiple JSON files contain world cities with names, longitude & latitude, country, and timezone
6
star
26

automation-protocols-metadata

JSON file that contains an update metadata of Automation Protocols (Industrial control system, process automation, building automation, automatic meter reading, and automobile)
6
star
27

incident-response

Incident response is a set of steps that are used to handle the aftermath of a data breach or cyberattack
5
star
28

ics-visualizer

ICS-Visualizer is an interactive Industrial Control Systems (ICS) network graph that contains up-to-date related automation protocols metadata (Name, company, port, user manuals, external links, and mapped wireshark\namp modules and scripts).
Python
5
star
29

mobile-numbers-metadata

JSON file contains all mobile number metadata (Country, prefix, and carrier)
5
star
30

countries-metadata

JSON file contains all countries metadata (Country name, cc, a3, and flag)
4
star
31

digital-forensics

Digital Forensics is the process of finding and analyzing electronic data
4
star
32

stored-cross-site-scripting

An adversary may inject malicious content into a vulnerable target
4
star
33

cybersecurity

Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks
3
star
34

directory-listing

A threat actor may list files on a misconfigured server
3
star
35

dom-based-cross-site-scripting

A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the victim's browser.
3
star
36

vertical-privilege-escalation

A threat actor may perform unauthorized functions belonging to another user with a higher privileges level
3
star
37

ports-metadata

JSON file contains all ports metadata
3
star
38

reflected-cross-site-scripting

A threat actor may inject malicious content into HTTP requests. The content will be reflected in the HTTP response and executed in the victim's browser
3
star
39

client-side-template-injection

A threat actor may trick a victim into executing native template syntax on a vulnerable target
3
star
40

risk-management

Risk management is the process of identifying, assessing, treating, and monitoring any negative events that affect a company's ability to operate (Preventing them or minimizing their harmful impact)
3
star
41

data-compliance

Data compliance is the process of following various regulations and standards to ensure that sensitive digital assets (data) are guarded against loss, theft, and misuse
3
star
42

open-redirect

A threat actor may send a malicious redirection request for a vulnerable target to a victim; the victim gets redirected to a malicious website that downloads an executable file
3
star
43

public-ip-metadata

JSON file contains all public ip ranges with description
2
star
44

minimal-server

Asyncio websocket http server [Needed for internal testing]
Python
2
star
45

authentication-bypass

A threat actor may gain access to data and functionalities by bypassing the target authentication mechanism
2
star
46

credential-stuffing

A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks
2
star
47

horizontal-privilege-escalation

A threat actor may perform unauthorized functions belonging to another user with a similar privileges level
2
star
48

icterid-template

Icterid Webapp Template
HTML
2
star
49

threat-actors

A threat actor is any person, group, or entity that could harm to the cyber realm
2
star
50

session-hijacking

A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier
2
star
51

xslt-injection

A threat actor may interfere with an application's processing of extensible stylesheet language transformations (XSLT) for extensible markup language (XML) to read or modify data on the target
2
star
52

default-credential

A threat actor may gain unauthorized access using the default username and password
2
star
53

private-ip-metadata

JSON file contains all private ip ranges with description
2
star
54

authorization-bypass

A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier
2
star
55

proxy-firewall

HTTPS Proxy Firewall for testing
Python
2
star
56

two-factor-authentication-brute-force

A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target
2
star
57

session-fixation

A threat actor may trick a user into using a known session identifier to log in. after logging in, the session identifier is used to gain access to the user's account
2
star
58

xxe-injection

A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's files
2
star
59

data-security

Safeguarding your personal information (How your info is protected)
1
star
60

cross-site-request-forgery

A threat actor may trick an authenticated or trusted victim into executing unauthorized actions on their behalf
1
star
61

os-command-injection

A threat actor may inject arbitrary operating system (OS) commands on target
1
star
62

asynico-websockets-redis-server

asynico websockets redis server (Needed for internal testing)
Python
1
star
63

.github

Github Settings
1
star
64

global-scripts

Some scripts for workflows (Moved from Macaw)
Shell
1
star
65

xpath-injection

A threat actor may alter the XML path language (XPath) query to read data on the target
1
star
66

password-spraying

A threat actor may guess the target credentials using a single password with a large set of usernames against the target
1
star
67

data-classification

Data classification defines and categorizes data according to its type, sensitivity, and value
1
star
68

remote-file-inclusion

A threat actor may cause a vulnerable target to include/retrieve remote file
1
star
69

session-replay

A threat actor may re-use a stolen or leaked session identifier to access the user's account
1
star
70

security-controls

Countermeasures or safeguards for detecting, preventing, and mitigating cyber threats and attacks (Protect assets)
1
star
71

access-control

Access Control is using security techniques to protect a system against unauthorized access
1
star
72

sql-injection

A threat actor may alter structured query language (SQL) query to read, modify and write to the database or execute administrative commands for further chained attacks
1
star
73

social-engineering-methods

1
star
74

cryptography

1
star
75

malware-and-indicators-of-compromise

1
star
76

local-file-inclusion

A threat actor may cause a vulnerable target to include/retrieve local file
1
star
77

security-tools-and-technologies

1
star
78

data-states

Data states refer to structured and unstructured data divided into three categories (At Rest, In Use, and In Transit)
1
star
79

insecure-deserialization

A threat actor may tamper with a stream that gets deserialized on the target, causing the target to access data or perform non-intended actions
1
star
80

data-privacy-and-security

1
star
81

application-service-attacks

1
star
82

data-lifecycle-management

Data Lifecycle Management (DLM) is a policy-based model for managing data in an organization
1
star
83

tornado-websockets-redis-server

tornado websockets redis server (Needed for internal testing)
Python
1
star
84

identity-and-access-management

The practice of ensuring that people or objects have the right level of access to assets
1
star
85

server-side-template-injection

A threat actor may alter the template syntax on the vulnerable target to execute commands
1
star
86

captcha-bypass

captcha bypass vulnerability
1
star