Cyber Detective💙💛 Profile picture
Every day I write about #osint (Open Source Intelligence) tools and techniques. Also little bit about forensics and cybersecurity in general. Work in @netlas_io

Jul 5, 2022, 7 tweets

XARGS 🧵

When I post a link to a #osint #cli tools, people ask me: "Why bother with the command line when you can do the same thing with online tools?"

№1 reason is the ability to automate the research of a LIST of domains, emails, phone numbers or other objects.

⬇️

This can be done using the XARGS utility, which is installed by default on Linux/MacOS (and can be installed on Windows).

I will show you how to use it using the BlackBird tool, which searches for profiles in 113 social networks by nickname.

github.com/p1ngul1n0/blac…

⬇️

1. Create file nicknames.txt and put some nicknames in it.

2. Run command:

cat nicknames.txt | xargs -L1 python3 blackbird․py -u

3. Wait for the script to finish and make sure the results folder contains the json files for each nickname.

⬇️

Detailed explanation of what we typed into the command line can be found on the explainshell.com (view pic)
Briefly:
1. Read the nicknames.txt file
2. Take from it one line at a time (L1) and use them as an argument to run BlackBird with the -u (username) parameter

⬇️

You can save the line

cat nicknames.txt | xargs -L1 python3 blackbird․py -u

into the blackbird․sh file and then run it many times with the command:

bash blackbird․sh

(replacing the information in the nicknames.txt file beforehand)

⬇️

Yes, many scripts for #osint support input as a txt file.

But the above method is universal for all scripts that run with arguments. And not only for Python, but also for Shell scripts, Perl, Node.js, Java etc.

⬆️

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling