No description
Find a file
2019-11-25 13:42:08 +01:00
images renamed screenshots to images 2019-07-16 16:29:51 +02:00
tests Update tests.all.SherlockDetectTests so it will only run tests against the detection methods. 2019-07-14 18:31:55 -05:00
.dockerignore ISSUE-238 Improved build steps in Dockerfile to allow caching and improved docker instructions 2019-07-13 22:18:18 +02:00
.gitignore Added Steam Group support, Added .ideadir to .gitignore 2019-02-03 14:01:27 -05:00
.travis.yml Add Python 3.8 to tests. 2019-10-19 22:29:54 -05:00
CODE_OF_CONDUCT.md Add CODE_OF_CONDUCT.md 2019-01-05 00:45:54 +03:30
CONTRIBUTING.md Update notes in contribute guide about removed sites. Add sites that were removed into a seprate json file: this will make it easier to test them in the future. 2019-10-20 06:48:39 -05:00
data.json added Shockwave 2019-11-25 13:42:08 +01:00
data_bad_site.json Removed Khan Academy. Usernames that don't exist are detected. First noticed 2019-10-25. 2019-10-26 15:05:58 -05:00
docker-compose.yml Fix typo in docker-compose.yaml 2019-11-24 09:18:49 -05:00
Dockerfile ISSUE-238 Improved build steps in Dockerfile to allow caching and improved docker instructions 2019-07-13 22:18:18 +02:00
install_packages.sh Fix typo 2019-01-26 11:20:36 +00:00
LICENSE Update LICENSE 2018-12-24 19:50:49 +01:00
load_proxies.py Try to back out "Fix stray f's that break on Linux" #198. The user was getting a syntax error from the format strings (probably from using an old version of Python). But, blindly removing the f-strings broke the actual functionality. 2019-05-15 07:39:39 -05:00
README.md Update version and site list. 2019-11-11 05:41:09 -06:00
removed_sites.md Removed Khan Academy. Usernames that don't exist are detected. First noticed 2019-10-25. 2019-10-26 15:05:58 -05:00
requirements.txt Fix dependency conflict for issue 2019-08-09 16:01:05 +08:00
sherlock.py Update version and site list. 2019-11-11 05:41:09 -06:00
site_list.py Change method used to get site ranking. Not only has alexa.com changed the format of their web site, they also seem to have gotten even more picky about people scraping it. So, use their API to query the site data. 2019-05-28 07:26:30 -05:00
sites.md Update version and site list. 2019-11-11 05:41:09 -06:00


Hunt down social media accounts by username across social networks
Website docker image

Demo    |    Installation    |    Usage    |    Docker Notes    |    Adding New Sites

Demo

You can use this link to test Sherlock directly in your browser: https://elody.com/scenario/plan/16/

Installation

NOTE: Python 3.6 or higher is required.

# clone the repo
$ git clone https://github.com/sherlock-project/sherlock.git

# change the working directory to sherlock
$ cd sherlock

# install python3 and python3-pip if they are not installed

# install the requirements
$ python3 -m pip install -r requirements.txt

Open in Cloud Shell

Usage

$ python3 sherlock.py --help
usage: sherlock.py [-h] [--version] [--verbose] [--rank]
                   [--folderoutput FOLDEROUTPUT] [--output OUTPUT] [--tor]
                   [--unique-tor] [--csv] [--site SITE_NAME]
                   [--proxy PROXY_URL] [--json JSON_FILE]
                   [--proxy_list PROXY_LIST] [--check_proxies CHECK_PROXY]
                   [--print-found]
                   USERNAMES [USERNAMES ...]

Sherlock: Find Usernames Across Social Networks (Version 0.9.4)

positional arguments:
  USERNAMES             One or more usernames to check with social networks.

optional arguments:
  -h, --help            show this help message and exit
  --version             Display version information and dependencies.
  --verbose, -v, -d, --debug
                        Display extra debugging information and metrics.
  --rank, -r            Present websites ordered by their Alexa.com global
                        rank in popularity.
  --folderoutput FOLDEROUTPUT, -fo FOLDEROUTPUT
                        If using multiple usernames, the output of the results
                        will be saved at this folder.
  --output OUTPUT, -o OUTPUT
                        If using single username, the output of the result
                        will be saved at this file.
  --tor, -t             Make requests over Tor; increases runtime; requires
                        Tor to be installed and in system path.
  --unique-tor, -u      Make requests over Tor with new Tor circuit after each
                        request; increases runtime; requires Tor to be
                        installed and in system path.
  --csv                 Create Comma-Separated Values (CSV) File.
  --site SITE_NAME      Limit analysis to just the listed sites. Add multiple
                        options to specify more than one site.
  --proxy PROXY_URL, -p PROXY_URL
                        Make requests over a proxy. e.g.
                        socks5://127.0.0.1:1080
  --json JSON_FILE, -j JSON_FILE
                        Load data from a JSON file or an online, valid, JSON
                        file.
  --proxy_list PROXY_LIST, -pl PROXY_LIST
                        Make requests over a proxy randomly chosen from a list
                        generated from a .csv file.
  --check_proxies CHECK_PROXY, -cp CHECK_PROXY
                        To be used with the '--proxy_list' parameter. The
                        script will check if the proxies supplied in the .csv
                        file are working and anonymous.Put 0 for no limit on
                        successfully checked proxies, or another number to
                        institute a limit.
  --print-found         Do not output sites where the username was not found.

For example to search for only one user:

python3 sherlock.py user123

To search for more than one user:

python3 sherlock.py user1 user2 user3

All of the accounts found will be stored in an individual text file with the corresponding username (e.g user123.txt).

Docker Notes

If you have docker installed you can build an image and run this as a container.

docker build -t mysherlock-image .

Once the image is built, sherlock can be invoked by running the following:

docker run --rm -t mysherlock-image user123

The optional --rm flag removes the container filesystem on completion to prevent cruft build-up. See: https://docs.docker.com/engine/reference/run/#clean-up---rm

The optional -t flag allocates a pseudo-TTY which allows colored output. See: https://docs.docker.com/engine/reference/run/#foreground

It is possible to use the following command to access the saved results:

docker run --rm -t -v "$PWD/results:/opt/sherlock/results" mysherlock-image -o /opt/sherlock/results/text.txt user123

The -v "$PWD/results:/opt/sherlock/results" option tells docker to create (or use) the folder results in the present working directory and to mount it at /opt/sherlock/results on the docker container. The -o /opt/sherlock/results/text.txt option tells sherlock to output the result.

Or you can simply use "Docker Hub" to run sherlock:

docker run theyahya/sherlock user123

Using docker-compose

You can also use the docker-compose.yml file from the repository and use this command

docker-compose run sherlok -o /opt/sherlock/results/text.txt user123

Adding New Sites

Please look at the Wiki entry on adding new sites to understand the issues.

NOTE: Sherlock is not accepting adult sites in the standard list.

Tests

If you are contributing to Sherlock, then Thank You!

Before creating a pull request with new development, please run the tests to ensure that everything is working great. It would also be a good idea to run the tests before starting development to distinguish problems between your environment and the Sherlock software.

The following is an example of the command line to run all the tests for Sherlock. This invocation hides the progress text that Sherlock normally outputs, and instead shows the verbose output of the tests.

$ python3 -m unittest tests.all --buffer --verbose

Note that we do currently have 100% test coverage. Unfortunately, some of the sites that Sherlock checks are not always reliable, so it is common to get response errors.

Stargazers over time

Stargazers over time

License

MIT © Yahya SayadArbabi
Original Creator - Siddharth Dushantha