Sherlock is a Python program that checks on many social network sites whether a user with the specified name is registered there, whether there is an existing or specific record with such a username (nick). Find in social. the network of a relative, friend or colleague by name and family is not obtained in all cases, as many users prefer to cover their data with pseudonyms (nicknames). However, there are special services and applications that allow you to find a person by photo in social networks. Software designed to search for people by photo determines the position of the face in the picture. The application creates a mask of points connected by lines, and then runs a special algorithm that compares all photos found on the network for matches. The search results contain a complete list of persons sorted by the percentage of matches. The good news for Windows users is that Sherlock can be run on any operating system.
And for the fastest access to the tool, the Sherlock online service was created. With Sherlock, you can search for users on a huge number of social platforms. This is useful if you need to collect information for social engineering attacks, or if you simply need to check the availability of a username. Sherlock is a fairly easy to use script. The obtained data can be very useful at the information gathering stage. A distinctive feature is a fast social media search tool. You can get more than 50 verified sites and a report on them in less than a minute.
Installation in Kali Linux is very simple, just execute the command:
Run like this:
To install, run the following commands:
Run like this:
1. First install Python and PIP on Windows. We look for the sherlock package in the PIP repositories:
The closest one found:
The description translates as “Sherlock username detective”. It may be the same tool we are interested in, but its version is 0.2.6, while the latest version at the time of writing is 0.10.4. If you want to go the easiest way, you can install like this:
But I recommend another option, thanks to which we will get the latest version of Sherlock.
2. We download the archive with the program: https://github.com/sherlock-project/sherlock/archive/master.zip
3. We unpack the archive and remember the folder, for example, I have this C:UsersMiAlDownloadssherlock-master.
4. Now open the command line: Win + x → Windows PowerShell.
5. In the command line, go to the folder with scripts using the command cd:
6. Let’s set the dependencies:
7. Let’s check if everything is fine, for this we will display a help message:
8. Run like this:
Above are the launch features depending on the operating system. I will show the operation of the program using a Windows example. For example, I want to find all profiles with a username miloserdov:
If the account is found, the site name and profile link will be displayed:
The inscription “Not Found!” means that a user with this name could not be found on this site:
A lot of information is displayed (the check is performed on almost 300 sites), it would be nice to make it more readable, at least by removing records about profiles not found. This is easily done with the –print-found option:
Agree, it has become much better:
If you know the alternative names of one user or want to search for several users at once, then just specify them through the skip:
It’s possible that you only need to check one or a few sites and you don’t want to wait for a full check on all social networks. In this case, use the –site option, followed by the name of the site. The names of the sites are displayed in the program’s output during validation, and you can also find them in the data.json file. The –site option can be used several times, that is, you can run the check on several sites at the same time, example command:
By default, a file of the type USER_NAME.txt is created for each user name in the program folder. Optionally, you can create a CSV file that can be opened by office programs for working with tables. In this file, the values will be separated by commas (can be used for scripting or importing to databases. To create a CSV file, specify the –csv option. By default, these files are created directly in the Sherlock directory, if you want to specify another directory, then use the – option fo SNEAKERS:
Instead of a file of the type USER_NAME.txt, you can specify any other name, for this use the -o FILE option. Note that this option only applies if a single username is being verified.
If you want the most popular sites to go first, specify the -r flag. The popularity of sites is determined by the results of the global ranking of Alexa.com.
Sherlock supports sending requests through a proxy. To do this, use the -proxy PROXY_URL option (a short version of the -p PROXY_URL option). Example proxy format: socks5://127.0.0.1:1080. If you want to take a proxy from the list, use the –proxy_list LIST PROXY option (short version of the option name -pl LIST PROXY). Proxies will be randomly selected from this list.
The file specified with the –proxy_list option must be in .csv format. In it, proxies should be described by the following fields: ‘ip’, ‘port’, ‘protocol’. Along with the –proxy_list option, you can specify the –check_proxies NUMBER (-cp NUMBER) option. In this case, a check for the functionality and anonymity of the proxy from the .csv file will be performed. Specify 0 to remove limits on the number of proxies that pass validation, or specify another number to set a limit.
Installing Tor on Windows
Installing Tor on Linux
Since Sherlock knows how to work with SOCKS5, after installing and running the Tor service on any operating system, use the –proxy option with the value socks5://localhost:9050:
If you don’t want to mess with Python, Tor, proxies, command line and options, then use a free online user search service in social networks based on Sherlock, its address is: https://suip.biz/ru/?act=sherlock
Just enter your username there and you’ll get results right in your web browser in minutes!