Description
Sherlock searches for usernames across 400+ social networks and websites. Given a username, it checks if accounts exist and returns profile URLs, making it invaluable for OSINT investigations.
Installation
BASH
pip install sherlock-project
# Or
git clone https://github.com/sherlock-project/sherlock && cd sherlock
pip install -r requirements.txt
Basic Usage
BASH
# Search single username
sherlock username
# Search multiple usernames
sherlock user1 user2 user3
# Save to file
sherlock username -o results.txt
sherlock username --csv # CSV output
sherlock username --json # JSON output
Advanced Usage
BASH
# Specific sites only
sherlock username --site twitter --site github --site instagram
# Proxy support
sherlock username --proxy socks5://127.0.0.1:1080
# Tor support
sherlock username --tor
# Print all sites (no filter)
sherlock username --print-all
# Timeout configuration
sherlock username --timeout 10
# Browse results
sherlock username --browse # Open found URLs in browser
Common Workflows
BASH
# Username OSINT pipeline
sherlock target_user --csv > results.csv
# Review found profiles for PII, cross-references
# Check same username on breach databases
# Correlate with email OSINT