├── image └── scan.png ├── README.md └── Hunter.py /image/scan.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/c0brabaghdad1/Hackers-Hunter/HEAD/image/scan.png -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them :mag_right: :detective: 2 | 3 | **Sample Scan ( python Hunter.py --user / -u username )** 4 | ![simple](https://github.com/c0brabaghdad1/Hackers-Hunter/blob/master/image/scan.png) 5 | 6 | **Help (python Hunter.py --help / -h )** 7 | 8 | # Checking Username on 9 | * bug bounty/CTF platforms and Security blogs and Subdomain by user in github/wordpress (user.github.io ,user.wordpress.com etc) and more 45+ 10 | * Sites out of scope this tool for example but not limited HackTheBox or more (because it's based in id not user) 11 | 12 | # False Positive 13 | i will show you example with (OpenBugBounty) Save and Run This Code 14 | 15 | * Python 16 | ``` 17 | import requests 18 | x = requests.get('https://www.openbugbounty.org/researchers/not_exist/') 19 | print(x.status_code) 20 | ``` 21 | __Response = 200__ 22 | 23 | * OR Linux CLI 24 | 25 | ``` curl -LI https://www.openbugbounty.org/researchers/not_exist/ -o /dev/null -w '%{http_code}\n' -s ``` 26 | 27 | __Response = 200__ 28 | 29 | * **the user not exist but return 200** :thinking::monocle_face: 30 | * **I am working to find other methods for example but not limited (based in Header as "Location") if you have any suggestions or solutions -> [Twitter](https://twitter.com/c0brabaghdad1)** 31 | 32 | # How to install (* linux) 33 | * git clone https://github.com/c0brabaghdad1/Hackers-Hunter.git 34 | * cd Hackers-Hunter 35 | * python Hunter.py --help / -h 36 | -------------------------------------------------------------------------------- /Hunter.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/python 2 | 3 | import requests 4 | import sys 5 | class colors: 6 | END = '\033[0m' 7 | RED='\033[31m' 8 | GREEN='\033[32m' 9 | ORANGE='\033[33m' 10 | Purple='\033[35m' 11 | CYAN='\033[1;96m' 12 | 13 | print colors.ORANGE+" Hackers Hunter v1.0 "+colors.END 14 | print colors.ORANGE+"[*] Written by: Mustafa - Twitter: twitter.com/c0brabaghdad1 [*]\n"+colors.END 15 | 16 | 17 | def main (user): 18 | try: 19 | print colors.RED + "Your Input : {} ".format(colors.Purple+user+colors.END)+colors.END 20 | #FaceBook 21 | url = "https://www.facebook.com/"+ user 22 | response = requests.get(url) 23 | if response.status_code == 200: 24 | response.close() 25 | print "[\033[36m+\033[0m]\033[36m FaceBook :\033[0m \033[0;37m" + url + "\033[0m" 26 | else:print "[\033[31m-\033[0m]\033[36m FaceBook :\033[0m \033[33mNot Found !\033[0m" 27 | #H1 28 | url = "https://hackerone.com/" + user 29 | response = requests.get(url) 30 | if response.status_code == 200: 31 | response.close() 32 | print "[\033[36m+\033[0m]\033[36m Hackerone :\033[0m \033[0;37m" + url + "\033[0m" 33 | else:print "[\033[31m-\033[0m]\033[36m Hackerone :\033[0m \033[33mNot Found !\033[0m" 34 | # Bugcrowd 35 | url = "https://bugcrowd.com/" + user 36 | response = requests.get(url) 37 | if response.status_code == 200: 38 | response.close() 39 | print "[\033[36m+\033[0m]\033[36m BugCrowd :\033[0m \033[0;37m" + url + "\033[0m" 40 | else:print "[\033[31m-\033[0m]\033[36m BugCrowd :\033[0m \033[33mNot Found !\033[0m" 41 | # Bugcrowd Blog 42 | url = "https://www.bugcrowd.com/blog/author/"+user+"/" 43 | response = requests.get(url) 44 | if response.status_code == 200: 45 | response.close() 46 | print "[\033[36m+\033[0m]\033[36m Bugcrowd Blog :\033[0m \033[0;37m" + url + "\033[0m" 47 | else:print "[\033[31m-\033[0m]\033[36m Bugcrowd Blog:\033[0m \033[33mNot Found !\033[0m" 48 | # OpenBugBounty 49 | url = "https://www.openbugbounty.org/researchers/"+user+"/" 50 | response = requests.get(url) 51 | if response.status_code == 200: 52 | response.close() 53 | print "[\033[36m+\033[0m]\033[36m OpenBugBounty :\033[0m \033[0;37m" + url + "\033[0m" 54 | else:print "[\033[31m-\033[0m]\033[36m OpenBugBounty :\033[0m \033[33mNot Found !\033[0m" 55 | # Yogosha 56 | url = "https://yogosha.com/ca_leaderboards/"+user+"/" 57 | response = requests.get(url) 58 | if response.status_code == 200: 59 | response.close() 60 | print "[\033[36m+\033[0m]\033[36m Yogosha :\033[0m \033[0;37m" + url + "\033[0m" 61 | else:print "[\033[31m-\033[0m]\033[36m Yogosha :\033[0m \033[33mNot Found !\033[0m" 62 | # YesWeHack 63 | url = "https://yeswehack.com/hunters/"+ user 64 | response = requests.get(url) 65 | if response.status_code == 200: 66 | response.close() 67 | print "[\033[36m+\033[0m]\033[36m YesWeHack :\033[0m \033[0;37m" + url + "\033[0m" 68 | else:print "[\033[31m-\033[0m]\033[36m YesWeHack :\033[0m \033[33mNot Found !\033[0m" 69 | # Intigriti 70 | url = "https://app.intigriti.com/profile/" + user 71 | response = requests.get(url) 72 | if response.status_code == 200: 73 | response.close() 74 | print "[\033[36m+\033[0m]\033[36m Intigriti :\033[0m \033[0;37m" + url + "\033[0m" 75 | else:print "[\033[31m-\033[0m]\033[36m Intigriti :\033[0m \033[33mNot Found !\033[0m" 76 | # Hackenproof 77 | url = "https://hackenproof.com/" + user 78 | response = requests.get(url) 79 | if response.status_code == 200: 80 | response.close() 81 | print "[\033[36m+\033[0m]\033[36m Hackenproof :\033[0m \033[0;37m" + url + "\033[0m" 82 | else:print "[\033[31m-\033[0m]\033[36m Hackenproof :\033[0m \033[33mNot Found !\033[0m" 83 | # Cobalt 84 | url = "https://app.cobalt.io/"+ user 85 | response = requests.get(url) 86 | if response.status_code == 200: 87 | response.close() 88 | print "[\033[36m+\033[0m]\033[36m Cobalt :\033[0m \033[0;37m" + url + "\033[0m" 89 | else:print "[\033[31m-\033[0m]\033[36m Cobalt :\033[0m \033[33mNot Found !\033[0m" 90 | # Cybertalents 91 | url = "https://cybertalents.com/members/{}/profile".format(user) 92 | response = requests.get(url) 93 | if response.status_code == 200: 94 | response.close() 95 | print "[\033[36m+\033[0m]\033[36m Cybertalents :\033[0m \033[0;37m" + url + "\033[0m" 96 | else:print "[\033[31m-\033[0m]\033[36m Cybertalents :\033[0m \033[33mNot Found !\033[0m" 97 | # BackdoorSdslabs 98 | url = "https://backdoor.sdslabs.co/users/"+ user 99 | response = requests.get(url) 100 | if response.status_code == 200: 101 | response.close() 102 | print "[\033[36m+\033[0m]\033[36m BackdoorSdslabs :\033[0m \033[0;37m" + url + "\033[0m" 103 | else:print "[\033[31m-\033[0m]\033[36m BackdoorSdslabs :\033[0m \033[33mNot Found !\033[0m" 104 | # TryHackMe 105 | url = "https://tryhackme.com/p/"+ user 106 | response = requests.get(url) 107 | if response.status_code == 200: 108 | response.close() 109 | print "[\033[36m+\033[0m]\033[36m TryHackMe :\033[0m \033[0;37m" + url + "\033[0m" 110 | else:print "[\033[31m-\033[0m]\033[36m TryHackMe :\033[0m \033[33mNot Found !\033[0m" 111 | # Crackmes 112 | url = "https://crackmes.one/user/" + user 113 | response = requests.get(url) 114 | if response.status_code == 200: 115 | response.close() 116 | print "[\033[36m+\033[0m]\033[36m Crackmes :\033[0m \033[0;37m" + url + "\033[0m" 117 | else:print "[\033[31m-\033[0m]\033[36m Crackmes :\033[0m \033[33mNot Found !\033[0m" 118 | # CryptoHack 119 | url = "https://cryptohack.org/user/"+ user 120 | response = requests.get(url) 121 | if response.status_code == 200: 122 | response.close() 123 | print "[\033[36m+\033[0m]\033[36m CryptoHack :\033[0m \033[0;37m" + url + "\033[0m" 124 | else:print "[\033[31m-\033[0m]\033[36m CryptoHack :\033[0m \033[33mNot Found !\033[0m" 125 | # W3Challs 126 | url = "https://w3challs.com/profile/"+ user 127 | response = requests.get(url) 128 | if response.status_code == 200: 129 | response.close() 130 | print "[\033[36m+\033[0m]\033[36m W3Challs :\033[0m \033[0;37m" + url + "\033[0m" 131 | else:print "[\033[31m-\033[0m]\033[36m W3Challs :\033[0m \033[33mNot Found !\033[0m" 132 | # BugReader 133 | url = "https://bugreader.com/"+ user 134 | response = requests.get(url) 135 | if response.status_code == 200: 136 | response.close() 137 | print "[\033[36m+\033[0m]\033[36m BugReader :\033[0m \033[0;37m" + url + "\033[0m" 138 | else:print "[\033[31m-\033[0m]\033[36m BugReader :\033[0m \033[33mNot Found !\033[0m" 139 | # HackingArticles 140 | url = "https://www.hackingarticles.in/author/"+user+"/" 141 | response = requests.get(url) 142 | if response.status_code == 200: 143 | response.close() 144 | print "[\033[36m+\033[0m]\033[36m HackingArticles :\033[0m \033[0;37m" + url + "\033[0m" 145 | else:print "[\033[31m-\033[0m]\033[36m HackingArticles :\033[0m \033[33mNot Found !\033[0m" 146 | # InfosecInstitute 147 | url = "https://resources.infosecinstitute.com/author/"+user+"/" 148 | response = requests.get(url) 149 | if response.status_code == 200: 150 | response.close() 151 | print "[\033[36m+\033[0m]\033[36m InfosecInstitute :\033[0m \033[0;37m" + url + "\033[0m" 152 | else:print "[\033[31m-\033[0m]\033[36m InfosecInstitute :\033[0m \033[33mNot Found !\033[0m" 153 | # Rapid7 154 | url = "https://blog.rapid7.com/author/"+user+"/" 155 | response = requests.get(url) 156 | if response.status_code == 200: 157 | response.close() 158 | print "[\033[36m+\033[0m]\033[36m Rapid7 :\033[0m \033[0;37m" + url + "\033[0m" 159 | else:print "[\033[31m-\033[0m]\033[36m Rapid7 :\033[0m \033[33mNot Found !\033[0m" 160 | # Acunetix 161 | url = "https://www.acunetix.com/blog/author/"+user+"/" 162 | response = requests.get(url) 163 | if response.status_code == 200: 164 | response.close() 165 | print "[\033[36m+\033[0m]\033[36m Acunetix :\033[0m \033[0;37m" + url + "\033[0m" 166 | else:print "[\033[31m-\033[0m]\033[36m Acunetix :\033[0m \033[33mNot Found !\033[0m" 167 | # Portswigger 168 | url = "https://portswigger.net/daily-swig/by/"+user+"/" 169 | response = requests.get(url) 170 | if response.status_code == 200: 171 | response.close() 172 | print "[\033[36m+\033[0m]\033[36m Portswigger :\033[0m \033[0;37m" + url + "\033[0m" 173 | else:print "[\033[31m-\033[0m]\033[36m Portswigger :\033[0m \033[33mNot Found !\033[0m" 174 | # Sans 175 | url = "https://www.sans.org/profiles/"+user+"/" 176 | response = requests.get(url) 177 | if response.status_code == 200: 178 | response.close() 179 | print "[\033[36m+\033[0m]\033[36m Sans :\033[0m \033[0;37m" + url + "\033[0m" 180 | else:print "[\033[31m-\033[0m]\033[36m Sans :\033[0m \033[33mNot Found !\033[0m" 181 | # HackerNoon 182 | url = "https://hackernoon.com/u/"+user 183 | response = requests.get(url) 184 | if response.status_code == 200: 185 | response.close() 186 | print "[\033[36m+\033[0m]\033[36m HackerNoon :\033[0m \033[0;37m" + url + "\033[0m" 187 | else:print "[\033[31m-\033[0m]\033[36m HackerNoon :\033[0m \033[33mNot Found !\033[0m" 188 | # Securitum 189 | url = "https://research.securitum.com/authors/"+user+"/" 190 | response = requests.get(url) 191 | if response.status_code == 200: 192 | response.close() 193 | print "[\033[36m+\033[0m]\033[36m Securitum :\033[0m \033[0;37m" + url + "\033[0m" 194 | else:print "[\033[31m-\033[0m]\033[36m Securitum :\033[0m \033[33mNot Found !\033[0m" 195 | # Netsparker 196 | url = "https://www.netsparker.com/blog/author/"+user+"/" 197 | response = requests.get(url) 198 | if response.status_code == 200: 199 | response.close() 200 | print "[\033[36m+\033[0m]\033[36m Netsparker :\033[0m \033[0;37m" + url + "\033[0m" 201 | else:print "[\033[31m-\033[0m]\033[36m Netsparker :\033[0m \033[33mNot Found !\033[0m" 202 | # BugBountyPoc 203 | url = "https://bugbountypoc.com/author/"+user+"/" 204 | response = requests.get(url) 205 | if response.status_code == 200: 206 | response.close() 207 | print "[\033[36m+\033[0m]\033[36m BugBountyPoc :\033[0m \033[0;37m" + url + "\033[0m" 208 | else:print "[\033[31m-\033[0m]\033[36m BugBountyPoc :\033[0m \033[33mNot Found !\033[0m" 209 | # AT&T Blog 210 | url = "https://cybersecurity.att.com/blogs/author/" + user 211 | response = requests.get(url) 212 | if response.status_code == 200: 213 | response.close() 214 | print "[\033[36m+\033[0m]\033[36m AT&T Blog :\033[0m \033[0;37m" + url + "\033[0m" 215 | else:print "[\033[31m-\033[0m]\033[36m AT&T Blog :\033[0m \033[33mNot Found !\033[0m" 216 | # GeeksforGeeks 217 | url = "https://auth.geeksforgeeks.org/user/"+user+"/" 218 | response = requests.get(url) 219 | if response.status_code == 200: 220 | response.close() 221 | print "[\033[36m+\033[0m]\033[36m GeeksforGeeks :\033[0m \033[0;37m" + url + "\033[0m" 222 | else:print "[\033[31m-\033[0m]\033[36m GeeksforGeeks :\033[0m \033[33mNot Found !\033[0m" 223 | # eLearnSecurity Blog 224 | url = "https://blog.elearnsecurity.com/author/mkreisher"+ user 225 | response = requests.get(url) 226 | if response.status_code == 200: 227 | response.close() 228 | print "[\033[36m+\033[0m]\033[36m eLearnSecurity Blog :\033[0m \033[0;37m" + url + "\033[0m" 229 | else:print "[\033[31m-\033[0m]\033[36m eLearnSecurity Blog :\033[0m \033[33mNot Found !\033[0m" 230 | # EC-Council Blog 231 | url = "https://blog.eccouncil.org/author/"+user+"/" 232 | response = requests.get(url) 233 | if response.status_code == 200: 234 | response.close() 235 | print "[\033[36m+\033[0m]\033[36m EC-Council Blog :\033[0m \033[0;37m" + url + "\033[0m" 236 | else:print "[\033[31m-\033[0m]\033[36m EC-Council Blog :\033[0m \033[33mNot Found !\033[0m" 237 | # Wattpad 238 | url = "https://www.wattpad.com/user/" + user 239 | response = requests.get(url) 240 | if response.status_code == 200: 241 | response.close() 242 | print "[\033[36m+\033[0m]\033[36m Wattpad :\033[0m \033[0;37m" + url + "\033[0m" 243 | else:print "[\033[31m-\033[0m]\033[36m Wattpad :\033[0m \033[33mNot Found !\033[0m" 244 | # Secjuice 245 | url = "https://www.secjuice.com/author/"+user+"/" 246 | response = requests.get(url) 247 | if response.status_code == 200: 248 | response.close() 249 | print "[\033[36m+\033[0m]\033[36m Secjuice :\033[0m \033[0;37m" + url + "\033[0m" 250 | else:print "[\033[31m-\033[0m]\033[36m Secjuice :\033[0m \033[33mNot Found !\033[0m" 251 | # Veracode 252 | url = "https://www.veracode.com/blog/author/"+ user 253 | response = requests.get(url) 254 | if response.status_code == 200: 255 | response.close() 256 | print "[\033[36m+\033[0m]\033[36m Veracode :\033[0m \033[0;37m" + url + "\033[0m" 257 | else:print "[\033[31m-\033[0m]\033[36m Veracode :\033[0m \033[33mNot Found !\033[0m" 258 | # NotABug 259 | url = "https://notabug.org/"+ user 260 | response = requests.get(url) 261 | if response.status_code == 200: 262 | response.close() 263 | print "[\033[36m+\033[0m]\033[36m NotABug :\033[0m \033[0;37m" + url + "\033[0m" 264 | else:print "[\033[31m-\033[0m]\033[36m NotABug :\033[0m \033[33mNot Found !\033[0m" 265 | # SecureIdeas 266 | url = "https://blog.secureideas.com/author/" + user 267 | response = requests.get(url) 268 | if response.status_code == 200: 269 | response.close() 270 | print "[\033[36m+\033[0m]\033[36m SecureIdeas Blog :\033[0m \033[0;37m" + url + "\033[0m" 271 | else:print "[\033[31m-\033[0m]\033[36m SecureIdeas Blog:\033[0m \033[33mNot Found !\033[0m" 272 | # DEV.TO 273 | url = "https://dev.to/" + user 274 | response = requests.get(url) 275 | if response.status_code == 200: 276 | response.close() 277 | print "[\033[36m+\033[0m]\033[36m DEV.TO :\033[0m \033[0;37m" + url + "\033[0m" 278 | else:print "[\033[31m-\033[0m]\033[36m DEV.TO :\033[0m \033[33mNot Found !\033[0m" 279 | # Medium 280 | url = "https://medium.com/" + user 281 | response = requests.get(url) 282 | if response.status_code == 200: 283 | response.close() 284 | print "[\033[36m+\033[0m]\033[36m Medium :\033[0m \033[0;37m" + url + "\033[0m" 285 | else:print "[\033[31m-\033[0m]\033[36m Medium :\033[0m \033[33mNot Found !\033[0m" 286 | # CVEbase 287 | url = "https://www.cvebase.com/researcher/" + user 288 | response = requests.get(url) 289 | if response.status_code == 200: 290 | response.close() 291 | print "[\033[36m+\033[0m]\033[36m CVEbase :\033[0m \033[0;37m" + url + "\033[0m" 292 | else:print "[\033[31m-\033[0m]\033[36m CVEbase :\033[0m \033[33mNot Found !\033[0m" 293 | # WonderHowTo 294 | url = "https://creator.wonderhowto.com/"+user+"/" 295 | response = requests.get(url) 296 | if response.status_code == 200: 297 | response.close() 298 | print "[\033[36m+\033[0m]\033[36m WonderHowTo :\033[0m \033[0;37m" + url + "\033[0m" 299 | else:print "[\033[31m-\033[0m]\033[36m WonderHowTo :\033[0m \033[33mNot Found !\033[0m" 300 | # Quora 301 | url = "https://www.quora.com/profile/"+user 302 | response = requests.get(url) 303 | if response.status_code == 200: 304 | response.close() 305 | print "[\033[36m+\033[0m]\033[36m Quora :\033[0m \033[0;37m" + url + "\033[0m" 306 | else:print "[\033[31m-\033[0m]\033[36m Quora :\033[0m \033[33mNot Found !\033[0m" 307 | # Netspi 308 | url = "https://blog.netspi.com/author/"+user+"/" 309 | response = requests.get(url) 310 | if response.status_code == 200: 311 | response.close() 312 | print "[\033[36m+\033[0m]\033[36m Netspi :\033[0m \033[0;37m" + url + "\033[0m" 313 | else:print "[\033[31m-\033[0m]\033[36m Netspi :\033[0m \033[33mNot Found !\033[0m" 314 | # Gitlab 315 | url = "https://gitlab.com/" + user 316 | response = requests.get(url) 317 | if response.status_code == 200: 318 | response.close() 319 | print "[\033[36m+\033[0m]\033[36m Gitlab :\033[0m \033[0;37m" + url + "\033[0m" 320 | else:print "[\033[31m-\033[0m]\033[36m Gitlab :\033[0m \033[33mNot Found !\033[0m" 321 | # Github 322 | url = "https://github.com/" + user 323 | response = requests.get(url) 324 | if response.status_code == 200: 325 | response.close() 326 | print "[\033[36m+\033[0m]\033[36m Github :\033[0m \033[0;37m" + url + "\033[0m" 327 | else:print "[\033[31m-\033[0m]\033[36m Github :\033[0m \033[33mNot Found !\033[0m" 328 | # Reddit 329 | url = "https://www.reddit.com/user/"+user 330 | response = requests.get(url) 331 | if response.status_code == 200: 332 | response.close() 333 | print "[\033[36m+\033[0m]\033[36m Reddit :\033[0m \033[0;37m" + url + "\033[0m" 334 | else:print "[\033[31m-\033[0m]\033[36m Reddit :\033[0m \033[33mNot Found !\033[0m" 335 | # Hackr 336 | url = "https://hackr.io/blog/author/"+user+"/" 337 | response = requests.get(url) 338 | if response.status_code == 200: 339 | response.close() 340 | print "[\033[36m+\033[0m]\033[36m Hackr :\033[0m \033[0;37m" + url + "\033[0m" 341 | else:print "[\033[31m-\033[0m]\033[36m Hackr :\033[0m \033[33mNot Found !\033[0m" 342 | # CoderByte 343 | url = "https://coderbyte.com/profile/"+ user 344 | response = requests.get(url) 345 | if response.status_code == 200: 346 | response.close() 347 | print "[\033[36m+\033[0m]\033[36m CoderByte :\033[0m \033[0;37m" + url + "\033[0m" 348 | else:print "[\033[31m-\033[0m]\033[36m CoderByte :\033[0m \033[33mNot Found !\033[0m" 349 | # TechTarget 350 | url = "https://www.techtarget.com/contributor/" + user 351 | response = requests.get(url) 352 | if response.status_code == 200: 353 | response.close() 354 | print "[\033[36m+\033[0m]\033[36m TechTarget :\033[0m \033[0;37m" + url + "\033[0m" 355 | else:print "[\033[31m-\033[0m]\033[36m TechTarget :\033[0m \033[33mNot Found !\033[0m" 356 | # FireEye 357 | url = "https://www.fireeye.com/blog/threat-research.html/category/etc/tags/fireeye-blog-authors/"+ user 358 | response = requests.get(url) 359 | if response.status_code == 200: 360 | response.close() 361 | print "[\033[36m+\033[0m]\033[36m FireEye Blog :\033[0m \033[0;37m" + url + "\033[0m" 362 | else:print "[\033[31m-\033[0m]\033[36m FireEye Blog :\033[0m \033[33mNot Found !\033[0m" 363 | #Subdomains (wordpress,Github,Blogspot) 364 | url = "https://{}.github.io/".format(user) 365 | response = requests.get(url) 366 | if response.status_code == 200: 367 | response.close() 368 | print "[\033[36m+\033[0m]\033[36m Github Subdomain Found :\033[0m \033[0;37m" + url + "\033[0m" 369 | else:print "[\033[31m-\033[0m]\033[36m Github Subdomain Not Found :\033[0m \033[33mNot Found !\033[0m" 370 | url = "https://{}.blogspot.com".format(user) 371 | response = requests.get(url) 372 | if response.status_code == 200: 373 | response.close() 374 | print "[\033[36m+\033[0m]\033[36m Blogspot Subdomain Found :\033[0m \033[0;37m" + url + "\033[0m" 375 | else:print "[\033[31m-\033[0m]\033[36m Blogspot Subdomain Not Found :\033[0m \033[33mNot Found !\033[0m" 376 | url = "https://{}.wordpress.com".format(user) 377 | response = requests.get(url) 378 | if response.status_code == 200: 379 | response.close() 380 | print "[\033[36m+\033[0m]\033[36m WordPress Subdomain Found :\033[0m \033[0;37m" + url + "\033[0m" 381 | else:print "[\033[31m-\033[0m]\033[36m WordPress Subdomain Not Found :\033[0m \033[33mNot Found !\033[0m" 382 | except : #requests.ConnectionError ##if you have bad network don't enable this option 383 | print(colors.RED+"Failed To Connect !"+colors.END) 384 | if len(sys.argv) > 1: 385 | if sys.argv[1] == "--user" or sys.argv[1] == "-u": 386 | if len(sys.argv) > 2: 387 | main(sys.argv[2]) 388 | else: 389 | print(colors.RED+"Missing Username Try -> -h"+colors.END) 390 | if sys.argv[1] == "--help" or sys.argv[1] == "-h": 391 | print (colors.GREEN+"Usage : --user or -u"+colors.END) 392 | print (colors.GREEN+"Usage : --help or -h "+colors.END) 393 | else: 394 | pass 395 | else: 396 | username = raw_input ("Enter Username : ") 397 | main(username) --------------------------------------------------------------------------------