
Major Social Networks: GitHub, Twitter, Instagram, LinkedIn, TikTok, Facebook, Reddit, YouTube, Twitch Professional: LinkedIn, GitHub, GitLab, Bitbucket, HackerNews, Medium Media & Creative: Instagram, YouTube, TikTok, Vimeo, SoundCloud, DeviantArt, Pinterest Gaming: Steam, Twitch, Roblox Communication: Telegram, Discord, Skype Marketplaces: Etsy, eBay And 80+ more platforms.
USRLINKS is a comprehensive Python reconnaissance tool that checks username availability across 100+ social media platforms and performs deep OSINT intelligence gathering. The tool features both command-line interface and web-based functionality, designed for security professionals, penetration testers, and OSINT investigators.
USRLINKS provides flexible deployment options with both terminal-based scanning and web interface capabilities for maximum portability, security, and integration with existing OSINT workflows. Reports are generated in multiple formats including HTML, JSON, and CSV for easy sharing and documentation.
- 100+ Platform Coverage: Scan username availability across major social networks, forums, and platforms
- Deep Reconnaissance: Extract emails, phone numbers, locations, and bio information from profiles
- Profile Intelligence: Analyze profile images with hash generation for cross-platform correlation
- Google Dorks Generator: Automatically generate targeted search queries for enhanced OSINT
- Advanced Reporting: Beautiful HTML reports with interactive tables and reconnaissance data
- Export Options: CSV and JSON formats for data analysis and integration
- Multi-threaded Scanning: Fast concurrent processing for efficient reconnaissance
- Proxy & Tor Support: Anonymous scanning with SOCKS/HTTP proxy support
- Retry Logic: Intelligent retry mechanisms for failed requests
- User Agent Rotation: Anti-detection measures with randomized headers
- Platform-Specific Detection: Custom logic for accurate availability detection
- Web Interface: Browser-based interface for ease of use and accessibility
- Command Line Interface: Terminal-based operation for automation and scripting
git clone https://github.com/stilla1ex/usrlinks.git
cd usrlinks
pip install -r requirements.txt
chmod +x usrlinks.sh
The easiest way to use USRLINKS with automatic HTML report generation:
# Basic scan with HTML report
./usrlinks.sh -u john_doe
# Deep scan with reconnaissance data
./usrlinks.sh -u john_doe --deep-scan
# List all supported platforms
./usrlinks.sh --list-platforms
For advanced users who prefer direct Python execution:
# Basic username scan
python3 usrlinks.py -u john_doe
# Deep reconnaissance scan
python3 usrlinks.py -u john_doe --deep-scan
# Generate Google dorks
python3 usrlinks.py -u john_doe --generate-dorks
# Export to JSON/CSV
python3 usrlinks.py -u john_doe --deep-scan --output json
# Anonymous scanning via Tor
python3 usrlinks.py -u john_doe --tor
# Use custom proxy
python3 usrlinks.py -u john_doe --proxy http://127.0.0.1:8080
- Interactive Summary Cards: Visual statistics of available/taken/error counts
- Sortable Results Table: Click-to-visit links for all platforms
- Reconnaissance Data: Detailed intelligence from deep scans
- Professional Styling: Clean, modern interface with responsive design
- Export Ready: Print-friendly layout for reporting
Major Social Networks: GitHub, Twitter, Instagram, LinkedIn, TikTok, Facebook, Reddit, YouTube, Twitch Professional: LinkedIn, GitHub, GitLab, Bitbucket, HackerNews, Medium Media & Creative: Instagram, YouTube, TikTok, Vimeo, SoundCloud, DeviantArt, Pinterest Gaming: Steam, Twitch, Roblox Communication: Telegram, Discord, Skype Marketplaces: Etsy, eBay **And 80+ more platforms...
View complete list:
./usrlinks.sh --list-platforms
Create a custom platforms.json
file to add new platforms:
{
"CustomSite": {
"url": "https://example.com/user/{}",
"method": "status_code",
"code": [404],
"recon_enabled": true
}
}
# Adjust thread count for faster scanning
python3 usrlinks.py -u username --threads 20
# Custom timeout for slow networks
python3 usrlinks.py -u username --timeout 30
usrlinks/
├── usrlinks.py # Main Python scanner
├── usrlinks.sh # Simple launcher script
├── requirements.txt # Python dependencies
├── results/ # HTML reports directory
├── README.md # This file
└── usrlinks.log # Scan logs
Contributions are welcome! The project is continuously evolving. Here's how you can help:
- Fork the repository
- Create a feature branch:
git checkout -b feature/amazing-feature
- Add new platforms to the platform database
- Improve reconnaissance modules for better data extraction
- Enhance the HTML reporting with new visualizations
- Submit a pull request
To add a new platform, modify the load_platforms()
function in usrlinks.py
:
"NewPlatform": {
"url": "https://newsite.com/{}",
"method": "status_code",
"code": [404],
"recon_enabled": True # Enable for deep scanning
}
We appreciate all the contributors who have helped make USRLINKS better:
- @stilla1ex - Project creator and maintainer
- @max5010cs - Contributor
IMPORTANT: This tool is designed for:
- Educational purposes and cybersecurity research
- Authorized penetration testing with proper permission
- OSINT investigations within legal boundaries
- Security assessments of your own accounts
Users are responsible for:
- Compliance with applicable laws and regulations
- Respecting platform terms of service
- Obtaining proper authorization before testing
- Using the tool ethically and responsibly
The developers are not responsible for any misuse of this tool.
This project is licensed under the MIT License - see the LICENSE file for details.
Open Source Intelligence (OSINT) is the practice of collecting information from publicly available sources. USRLINKS facilitates legitimate OSINT activities by automating username reconnaissance across multiple platforms, helping security professionals identify digital footprints and potential security exposures.
Star this repository if you find it useful!
Found a bug? Open an issue
Have a feature request? Start a discussion