Hunt down social media accounts by username across Social Networks
Most Welcome Guys, So in today's blog I will tell you that how to find all Social Media Accounts of a person using his/her Username.
So in this process, we will use Termux, or Kali/Parrot Linux.
Installing required tools:
So, First Step, We will install a tool from github. Sherlock is a Free Available Tool built in python. It can scan all Popular Social Media Accounts, like Facebook, Instagram, Twitter, Github, etc.
Sherlock Installation:
#clone the repo
git clone https://github.com/sherlock-project/sherlock.git
#change the working directory to sherlock
cd sherlock
# install the requirements
python3 -m pip install -r requirements.txt
Usage
$ python3 sherlock --help
usage: sherlock [-h] [--version] [--verbose] [--folderoutput FOLDEROUTPUT]
[--output OUTPUT] [--tor] [--unique-tor] [--csv]
[--site SITE_NAME] [--proxy PROXY_URL] [--json JSON_FILE]
[--timeout TIMEOUT] [--print-all] [--print-found] [--no-color]
[--browse] [--local]
USERNAMES [USERNAMES ...]
Sherlock: Find Usernames Across Social Networks (Version 0.14.2)
positional arguments:
USERNAMES One or more usernames to check with social networks.
Check similar usernames using {%} (replace to '_', '-', '.').
optional arguments:
-h, --help show this help message and exit
--version Display version information and dependencies.
--verbose, -v, -d, --debug
Display extra debugging information and metrics.
--folderoutput FOLDEROUTPUT, -fo FOLDEROUTPUT
If using multiple usernames, the output of the results will be
saved to this folder.
--output OUTPUT, -o OUTPUT
If using single username, the output of the result will be saved
to this file.
--tor, -t Make requests over Tor; increases runtime; requires Tor to be
installed and in system path.
--unique-tor, -u Make requests over Tor with new Tor circuit after each request;
increases runtime; requires Tor to be installed and in system
path.
--csv Create Comma-Separated Values (CSV) File.
--xlsx Create the standard file for the modern Microsoft Excel
spreadsheet (xslx).
--site SITE_NAME Limit analysis to just the listed sites. Add multiple options to
specify more than one site.
--proxy PROXY_URL, -p PROXY_URL
Make requests over a proxy. e.g. socks5://127.0.0.1:1080
--json JSON_FILE, -j JSON_FILE
Load data from a JSON file or an online, valid, JSON file.
--timeout TIMEOUT Time (in seconds) to wait for response to requests (Default: 60)
--print-all Output sites where the username was not found.
--print-found Output sites where the username was found.
--no-color Don't color terminal output
--browse, -b Browse to all results on default browser.
--local, -l Force the use of the local data.json file.
To search for only one user:
python3 sherlock user123
To search for more than one user:
python3 sherlock user1 user2 user3
Accounts found will be stored in an individual text file with the corresponding username (e.g user123.txt
).
Applying on a Real Account:
Now After Installing this Awesome Tool, I will scan a user "username" for a demo purpose.
Type Command like this to search for user:
Command: python3 sherlock username
So as you can see in above Pic, "username" exists in these Social Websites.
So
Thanks Guys For Coming to my Blog, Comment your Experience while
reading this blog, and Comment whether you are success or not, if there
any error, feel free to write...
No comments:
Post a Comment