
Crawls the given URL and finds broken social media links that can be hijacked. Broken social links may allow an attacker to conduct phishing attacks. It also can cost a loss of the company's reputation. Broken social media hijack issues are usually accepted on the bug bounty programs.
Currently, it supports Twitter, Facebook, Instagram and Tiktok without any API keys.
More at: https://github.com/utkusen/socialhunter
DEMO
Installation
From Binary
You can download the pre-built binaries from the releases page and run. For example:
wget https://github.com/utkusen/socialhunter/releases/download/v0.1.1/socialhunter_0.1.1_Linux_amd64.tar.gz
tar xzvf socialhunter_0.1.1_Linux_amd64.tar.gz
./socialhunter --help
From Source
- Install Go on your system
- Run:
go get -u github.com/utkusen/socialhunter
Usage
socialhunter requires 2 parameters to run:
-f
: Path of the text file that contains URLs line by line. The crawl function is path-aware. For example, if the URL is, it only crawls the pages under /blog
the path
-w
: The number of workers to run (e.g -w 10
). The default value is 5. You can increase or decrease this by testing out the capability of your system.
Donation
Loved the project? You can buy me a coffee
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky