One of the most common challenges in OSINT investigations is piecing together email information from fragmented digital traces. You find usernames, partial emails in data breaches, masked addresses, and various clues scattered across multiple platforms — but connecting these dots to find the actual email address can be time‑consuming and frustrating.
Introducing Email Composer: From Pseudonym to Email — automatically reconstruct email addresses from scattered OSINT data.
Email Composer activates automatically during Pseudonym searches only — ensuring it remains relevant and targeted to investigations where email discovery makes the most sense. This focused approach prevents information overload while maximizing utility for actual email research.
Performs a global merge of all email‑related data found across:
Profile cards from various platforms
Data breach sections (leaks)
Any email indicators discovered during the search
Smart Prioritization
When multiple sources contain the same email information, card data always takes priority over leak data. This ensures the most current and contextually relevant information surfaces first.
Advanced Reconstruction
Goes beyond collection to intelligently rebuild masked or partial emails:
Provider inference (e.g., Gmail, Outlook)
Local‑part consolidation from username/handle/name
Strict Output Policy: Email Composer never suggests masked or partially hidden emails (no * patterns). Only complete, actionable addresses are shown.
Cross‑Reference Validation: The AI analysis prioritizes usernames and handles while scanning bios and descriptions for professional email addresses, ensuring comprehensive coverage.User Control: Email Composer can be disabled in settings if you prefer manual discovery.
Detected inputs appear in a compact banner; click it to open Email Composer.
3
Review suggestions
Inspect the ranked suggestions and copy any candidate with one click.
4
Run AI analysis (optional)
If you’re on Pro/Advanced, use Advanced AI Analysis for validation and alternatives.
5
Refine and proceed
Leverage the best candidate(s) for email or further verification.
Email Composer transforms scattered digital traces into actionable email information — scoped to pseudonym investigations where email discovery matters most.