
USRLINKS is a comprehensive Python reconnaissance tool that checks username availability across 100+ social media platforms and performs deep OSINT intelligence gathering. Designed for security professionals, penetration testers, and OSINT investigators.
- 100+ Platform Coverage: Scan username availability across major social networks, forums, and platforms
- Deep Reconnaissance: Extract emails, phone numbers, locations, and bio information from profiles
- Profile Intelligence: Analyze profile images with hash generation for cross-platform correlation
- Google Dorks Generator: Automatically generate targeted search queries for enhanced OSINT
- Advanced Reporting: Beautiful HTML reports with interactive tables and reconnaissance data
- Export Options: CSV and JSON formats for data analysis and integration
- Multi-threaded Scanning: Fast concurrent processing for efficient reconnaissance
- Proxy & Tor Support: Anonymous scanning with SOCKS/HTTP proxy support
- Retry Logic: Intelligent retry mechanisms for failed requests
- User Agent Rotation: Anti-detection measures with randomized headers
- Platform-Specific Detection: Custom logic for accurate availability detection
git clone https://github.com/stilla1ex/usrlinks.git
cd usrlinks
pip install -r requirements.txt
chmod +x usrlinks.sh
The easiest way to use USRLINKS with automatic HTML report generation:
# Basic scan with HTML report
./usrlinks.sh -u john_doe
# Deep scan with reconnaissance data
./usrlinks.sh -u john_doe --deep-scan
# List all supported platforms
./usrlinks.sh --list-platforms
For advanced users who prefer direct Python execution:
# Basic username scan
python3 usrlinks.py -u john_doe
# Deep reconnaissance scan
python3 usrlinks.py -u john_doe --deep-scan
# Generate Google dorks
python3 usrlinks.py -u john_doe --generate-dorks
# Export to JSON/CSV
python3 usrlinks.py -u john_doe --deep-scan --output json
# Anonymous scanning via Tor
python3 usrlinks.py -u john_doe --tor
# Use custom proxy
python3 usrlinks.py -u john_doe --proxy http://127.0.0.1:8080
- Interactive Summary Cards: Visual statistics of available/taken/error counts
- Sortable Results Table: Click-to-visit links for all platforms
- Reconnaissance Data: Detailed intelligence from deep scans
- Professional Styling: Clean, modern interface with responsive design
- Export Ready: Print-friendly layout for reporting
Major Social Networks: GitHub, Twitter, Instagram, LinkedIn, TikTok, Facebook, Reddit, YouTube, Twitch Professional: LinkedIn, GitHub, GitLab, Bitbucket, HackerNews, Medium Media & Creative: Instagram, YouTube, TikTok, Vimeo, SoundCloud, DeviantArt, Pinterest Gaming: Steam, Twitch, Roblox Communication: Telegram, Discord, Skype Marketplaces: Etsy, eBay **And 80+ more platforms...
View complete list:
./usrlinks.sh --list-platforms
Create a custom platforms.json
file to add new platforms:
{
"CustomSite": {
"url": "https://example.com/user/{}",
"method": "status_code",
"code": [404],
"recon_enabled": true
}
}
# Adjust thread count for faster scanning
python3 usrlinks.py -u username --threads 20
# Custom timeout for slow networks
python3 usrlinks.py -u username --timeout 30
usrlinks/
├── usrlinks.py # Main Python scanner
├── usrlinks.sh # Simple launcher script
├── requirements.txt # Python dependencies
├── results/ # HTML reports directory
├── README.md # This file
└── usrlinks.log # Scan logs
Contributions are welcome! The project is continuously evolving. Here's how you can help:
- Fork the repository
- Create a feature branch:
git checkout -b feature/amazing-feature
- Add new platforms to the platform database
- Improve reconnaissance modules for better data extraction
- Enhance the HTML reporting with new visualizations
- Submit a pull request
To add a new platform, modify the load_platforms()
function in usrlinks.py
:
"NewPlatform": {
"url": "https://newsite.com/{}",
"method": "status_code",
"code": [404],
"recon_enabled": True # Enable for deep scanning
}
IMPORTANT: This tool is designed for:
- Educational purposes and cybersecurity research
- Authorized penetration testing with proper permission
- OSINT investigations within legal boundaries
- Security assessments of your own accounts
Users are responsible for:
- Compliance with applicable laws and regulations
- Respecting platform terms of service
- Obtaining proper authorization before testing
- Using the tool ethically and responsibly
The developers are not responsible for any misuse of this tool.
This project is licensed under the MIT License - see the LICENSE file for details.
Open Source Intelligence (OSINT) is the practice of collecting information from publicly available sources. USRLINKS facilitates legitimate OSINT activities by automating username reconnaissance across multiple platforms, helping security professionals identify digital footprints and potential security exposures.
⭐ Star this repository if you find it useful!
🐛 Found a bug? Open an issue
💡 Have a feature request? Start a discussion