Skip to content

Sherlock

Hunt usernames across 400+ social networks

Description

Sherlock searches for usernames across 400+ social networks and websites. Given a username, it checks if accounts exist and returns profile URLs, making it invaluable for OSINT investigations.

Installation

BASH
pip install sherlock-project
# Or
git clone https://github.com/sherlock-project/sherlock && cd sherlock
pip install -r requirements.txt

Basic Usage

BASH
# Search single username
sherlock username

# Search multiple usernames
sherlock user1 user2 user3

# Save to file
sherlock username -o results.txt
sherlock username --csv     # CSV output
sherlock username --json    # JSON output

Advanced Usage

BASH
# Specific sites only
sherlock username --site twitter --site github --site instagram

# Proxy support
sherlock username --proxy socks5://127.0.0.1:1080

# Tor support
sherlock username --tor

# Print all sites (no filter)
sherlock username --print-all

# Timeout configuration
sherlock username --timeout 10

# Browse results
sherlock username --browse    # Open found URLs in browser

Common Workflows

BASH
# Username OSINT pipeline
sherlock target_user --csv > results.csv
# Review found profiles for PII, cross-references
# Check same username on breach databases
# Correlate with email OSINT