Reconnaissance tool designed to identify Twitter accounts vulnerable to sim-swap attacks.
Important
Simsleuth is already setup on an existing Telegram Bot Here.
Please note that this project is a work in progress. Refer to the goals section below.
simsleuth
is a specialized reconnaissance tool designed for the purpose of identifying Twitter accounts that may be vulnerable to sim-swap attacks. Sim-swap attacks are a type of cybersecurity threat where an attacker fraudulently gains control over a victim's phone number, often by tricking a mobile carrier into transferring the number to a new SIM card under the attacker's control.
"Over the past four months $13.3M+ has been stolen as a result of 54 SIM swaps targeting people in the crypto space." - ZachXBT
recording.mov
- Implement doxx pre-check to avoid "Further verification needed"
- Provide Twitter Account Interaction Statistics
- Automate Phone Carrier Lookup (e.g., T-Mobile, AT&T, Verizon)
- Enhance Autodoxxing capabilities using IntelX
To get started, clone the repository:
git clone https://github.com/prostate/simsleuth && cd simsleuth
Fill in the config.toml
file with the necessary information:
[telegram]
token = "YOUR_TELEGRAM_BOT_TOKEN"
[web]
proxy_url="http://user:password@ip:port"
Then:
pip3 install telebot toml rich requests
python3 svc.py
- ZachXBT (aka fed): For inspiring this project