Skip to content

Reconnaissance tool designed to identify Twitter accounts vulnerable to sim-swap attacks.

Notifications You must be signed in to change notification settings

kittens/simsleuth

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

simsleuth

Reconnaissance tool designed to identify Twitter accounts vulnerable to sim-swap attacks.

simsleuth

Important

Simsleuth is already setup on an existing Telegram Bot Here.

SetupDemoGoals

Please note that this project is a work in progress. Refer to the goals section below.

What is simsleuth?

simsleuth is a specialized reconnaissance tool designed for the purpose of identifying Twitter accounts that may be vulnerable to sim-swap attacks. Sim-swap attacks are a type of cybersecurity threat where an attacker fraudulently gains control over a victim's phone number, often by tricking a mobile carrier into transferring the number to a new SIM card under the attacker's control.

"Over the past four months $13.3M+ has been stolen as a result of 54 SIM swaps targeting people in the crypto space." - ZachXBT

zach

Demo

recording.mov

Goals

  • Implement doxx pre-check to avoid "Further verification needed"
  • Provide Twitter Account Interaction Statistics
  • Automate Phone Carrier Lookup (e.g., T-Mobile, AT&T, Verizon)
  • Enhance Autodoxxing capabilities using IntelX

Setup

To get started, clone the repository:

git clone https://github.com/prostate/simsleuth && cd simsleuth

Fill in the config.toml file with the necessary information:

[telegram]
token = "YOUR_TELEGRAM_BOT_TOKEN"

[web]
proxy_url="http://user:password@ip:port"

Then:

pip3 install telebot toml rich requests
python3 svc.py

Acknowledgments

  • ZachXBT (aka fed): For inspiring this project

About

Reconnaissance tool designed to identify Twitter accounts vulnerable to sim-swap attacks.

Topics

Resources

Stars

Watchers

Forks

Languages