A powerful open-source intelligence toolkit combining Sherlock with custom Google Dorks to trace online identities using only a username.
- 🔍 Search 300+ social platforms using Sherlock
- 🌐 Run targeted Google Dork queries
- 📁 Output cached content locations (PDFs, blogs, profiles)
git clone https://github.com/yourusername/osint-sleuth.git
cd osint-sleuth
pip install -r requirements.txt
## Requirements
- Python 3.x
- pip
## Installation
1. **Clone or Download** the repository:
```bash
git clone https://github.com/yourusername/osint-sleuth.git
cd osint-sleuth-
Install Dependencies:
python -m pip install --user . -
Install Sherlock:
python -m pip install --user .
To run Sherlock globally from any directory, add C:\Users\Admin\AppData\Roaming\Python\Python312\Scripts to your system PATH.
- Go to System Properties > Advanced > Environment Variables.
- Under System variables, find
Pathand click Edit. - Add the path:
C:\Users\Admin\AppData\Roaming\Python\Python312\Scripts.
-
Open Command Prompt or PowerShell.
-
To search for a username:
sherlock <username>
- osint_sleuth.py: Main script
- dorks_list.txt: List of Google dorks
- usernames.txt: Usernames to search
- requirements.txt: Dependencies
- LICENSE: Project license
MIT License - see LICENSE.
All information gathered is from publicly accessible sources. This tool is intended for ethical OSINT research, education, and privacy awareness.