Skip to main content

Username Osint #2

Today we will gonna use a tool for username osint but before reading this blog i recommend you guys to go back and read my previous blog because in that blog i've explained the importance of username and why it is crucial for every osint investigator to investigate a username, so do not forget to read my previous blog.

Main image

So in this blog we are gonna use a tool named sherlock which is an open source tool developed by sdushantha. Sherlock will search usernames in 300 different social media platforms for better results. It is also one of the widely used tool in osint and hacking industries.

In order to use sherlock we need to install it first on our system, i'm gonna use my windows subsystem linux for this blog and i assume that you guys are using wsl too.

Commands

git clone https://github.com/sherlock-project/sherlock.git

sherlock-installation

After cloning the tool go inside the sherlock directory and install the required packages by running the  python3 -m pip install -r requirements.txt command. Now go inside the sherlock directory and then run the tool.

sherlock help

 After installing and setting up everything let's move on to the main part of this blog which is to find our target with the help of username, so let's begin.

Note: I'm using my own username "whit3_hat" as target.

Basic Result

basic result

Results using Print-All Option

sherlock with options
There are lot more options which you can use to filter the results and save the result on your system. Remember that sherlock is very handy and useful to find usernames as it's not only search the platforms but also give the full link of user profile so that you can directly visit to their profiles and that's it for this blog hope you find this useful.


Comments