A OSINT tool to obtain a target's phone number just by having his email address
email2phonenumber is an OSINT tool that allows you to obtain a target’s phone number just by having his email address.
For full details check: https://www.martinvigo.com/email2phonenumber
Demo: https://www.youtube.com/watch?v=dfvqhDUn81s
IMPORTANT: *email2phonenumber is a proof-of-concept tool I wrote during my research on new OSINT methodologies to obtain a target’s phone number. The supported services (Ebay, Lastpass, Amazon and Twitter) have long added protections to protect from these type of scraping like having to receive a code over email first or simply adding captchas. There are of course many other sites that are still leaking phone number digits but I am focused on other research projects. Feel free to submit pull request if you want to add support for new sites.
Please check out my newer tool “Phonerator”, which is maintained and focuses on the novel aspect of this research, generating valid phone numbers.
See more details. There is also a small OSINT challenge in there… 😉
This tool helps automate discovering someone’s phone number by abusing password reset design weaknesses and publicly available data. It supports 3 main functions:
email2phonenumber was developed on Python 3.x
You will need couple 3rd party libraries: BeautifulSoup and requests. These can be easily installed with pip
pip3 install beautifulsoup4 requests
Scrape websites for phone number digits
python3 email2phonenumber.py scrape -e [email protected]
Generate a dictionary of valid phone numbers based on a phone number mask
python3 email2phonenumber.py generate -m 555XXX1234 -o /tmp/dic.txt
Find target’s phone number by resetting passwords on websites that do not alert the target using a phone number mask and proxies to avoid captchas and other abuse protections
python3 email2phonenumber.py bruteforce -m 555XXX1234 -e [email protected] -p /tmp/proxies.txt -q
Martin Vigo - @martin_vigo - martinvigo.com