Electronic mail (Email): search for a contact by minimum data

Nowadays almost every teenager with Internet access can create email. Many domains provide a wide spectrum for users, thereby attracting even more people. Expanding the possibilities of interaction through the mailer (signing contracts, for example) opens up prospects for business communication, as well as romantic correspondence.

How the global search system works

Meanwhile, almost everyone has a desire to get more information about a potential partner or a person with whom communication has started online. And the methods of collecting data are topical today, in addition, they function for free - these are almost all of the sites listed.

The system works in different directions, allowing you to find people, with minimal information about them. If suddenly a person has forgotten the email address of the contact of interest, but remembers the phone number, surname, some other communication details, then using the collected list of sites, he will be able to receive the user's exact email.

It is interesting that in the case when a person uses gmail.com to log into e-mail by login, it is possible to identify a similar nickname on other domains and determine exactly whether there is a connection between them. After all, today many people use false names when registering.

Secondary data from visiting sites is also recorded by server bots, transmitted to search services and stored until someone decides to find a person using specific and limited parameters:

Thus, the connection between all accounts that a user opens on the network is determined: social networks, chats, news portals, up to online stores. All these actions of the network are facilitated by the need to create e-mail quickly, and registration services require leaving these traces: phone numbers, animal names, alternative boxes.

Services that are used for hacking or its prevention

The site also contains resources that optimize data collection, exploits and vulnerabilities – these are special scripts or small applications that conduct attacks through server breaches.


This resource is focused on collecting information using free programs, websites, mobile applications, etc. The main goal is to help people find resources that make it possible to get information for free.

Initially, the materials were collected focusing on information security. However, many resources from other directions were added later. Please email us if you think we have forgotten something.

The OSINT Framework project is taken as a basis.

Suggestions, comments, feedback

Write to our email [email protected]