Overview
People Hunter identifies people associated with a target organization by discovering publicly exposed email addresses and social media profiles. It combines web crawling with external API queries to build a list of contacts. People Hunter is a discovery tool: it gathers publicly available contact information but does not test for vulnerabilities. It does not add data to your Attack Surface or generate findings.Parameters
| Parameter | Description |
|---|---|
| Target | IP address or hostname to scan |
How it works
Hostname extraction
If scanning an IP address, extracts the hostname from the SSL certificate’s Common Name (CN).
API queries
Queries the Tomba.io API to retrieve indexed email addresses associated with the domain.
Web crawling
Uses the Katana crawler to discover and crawl pages on the target website (up to 10 minutes).
Information extraction
Searches crawled content for email addresses and social media profile links using regex patterns.
Validation
Validates discovered emails by performing DNS MX lookups and filters out emails from external domains.
Email discovery
The tool discovers emails using two techniques:| Technique | Description |
|---|---|
| Active | Regex pattern matching in crawled web pages (HTML, JavaScript, JSON, XML) |
| Passive | External API queries via Tomba.io for indexed email addresses |
- Validated via DNS MX lookup (domain must have valid mail servers)
- Filtered to only include emails matching the target domain
- Organized by username pattern
Username patterns
Emails are analyzed and grouped by their local part format:| Pattern | Example |
|---|---|
| Single name | john@company.com |
| First and last name with dot | john.doe@company.com |
| First and last name with underscore | john_doe@company.com |
| First and last name with hyphen | john-doe@company.com |
| Unidentified pattern | Other formats (e.g., jdoe123@company.com) |
Social media profiles
The tool identifies links to social media profiles by matching URL patterns in crawled content:| Platform | Detected URLs |
|---|---|
linkedin.com/in/, linkedin.com/company/ | |
facebook.com/, fb.com/, m.facebook.com/ | |
| Twitter/X | twitter.com/ |
instagram.com/ |
The tool filters out non-profile URLs like share buttons, login pages, and embedded content to reduce false positives.
Technical details
- Port scanned: 443 (HTTPS)
- Crawl duration: Up to 10 minutes per port
- Crawler: Katana (high-speed web crawler)
- Email validation: DNS MX record lookup with 2-second timeout
- Content types scanned: HTML, JavaScript, JSON, XML
Limitations
- Only scans port 443 by default
- Requires an HTTPS web server on the target
- Email discovery depends on publicly accessible content
- Tomba API has rate limits that may affect results
- Social media detection is limited to major platforms
Follow-up actions
After discovering people and contact information:- Expand your search: Use Google Hacking to find additional exposed data on paste sites and code repositories
- Fingerprint technologies: Run Website Recon to understand the target’s technology stack
- Discover more subdomains: Use Subdomain Finder to find additional subdomains that may expose more contacts
- Find related domains: Use Domain Finder to discover other domains owned by the organization
- Test credentials: With proper authorization, use Password Auditor for credential testing