Email and credential harvester for darkweb OSINT.
This tool is for educational and security research purposes. Users are responsible for compliance with all applicable laws.
- Email, username, and password extraction
- Credential pair detection (email:password)
- Phone number extraction
- SQLite database with historical tracking
- Multi-threaded batch file processing
- Advanced token/key extraction
- Password pattern analysis
- Duplicate password detection
- Leak source identification
- CSV export
pip install requests beautifulsoup4Tor must be running on 127.0.0.1:9050.
-
Install Tor:
# Debian/Ubuntu sudo apt install tor sudo systemctl start tor # macOS brew install tor tor
-
Install dependencies:
pip install requests beautifulsoup4
torsocks python torvester.py- Extract from URL
- Extract from file
- Extract from text input
- Batch extract from directory
- Search database
harvested_data/
├── emails.txt # Email list
├── credentials.txt # Email:password pairs
├── finding_*.json # Individual findings
├── report_*.json # Full report
├── export_*.csv # CSV export
└── harvester.db # SQLite database
emails table:
- email, domain, first_seen, last_seen, source, breach_count
credentials table:
- email, password_hash, password_plain, source, timestamp
findings table:
- source, timestamp, data_type, value
Domain Analysis:
- Top domains by frequency
- Unique domain count
Password Analysis:
- Length distribution
- Character type usage (digits, special, upper, lower)
- Visual distribution graph
Duplicate Detection:
- Hash-based duplicate password identification
- Usage frequency tracking
Leak Source Detection:
- Collection identification
- Breach detection
- Paste site recognition
- Forum/market indicators
- JSON: Complete data with metadata
- TXT: Email and credential lists
- CSV: Tabular format (Type, Value, Source)
Version : 1.0
License: MIT License - See LICENSE file
Developer: DR4CBOI
Contact: dr4cboi@protonmail.com