Skip to content

sunilkbishnoi/osint-sleuth

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🕵️‍♂️ OSINT Sleuth

A powerful open-source intelligence toolkit combining Sherlock with custom Google Dorks to trace online identities using only a username.

Features

  • 🔍 Search 300+ social platforms using Sherlock
  • 🌐 Run targeted Google Dork queries
  • 📁 Output cached content locations (PDFs, blogs, profiles)

Installation

git clone https://github.com/yourusername/osint-sleuth.git
cd osint-sleuth
pip install -r requirements.txt


## Requirements

- Python 3.x
- pip

## Installation

1. **Clone or Download** the repository:
   ```bash
   git clone https://github.com/yourusername/osint-sleuth.git
   cd osint-sleuth
  1. Install Dependencies:

    python -m pip install --user .
  2. Install Sherlock:

    python -m pip install --user .

Adding Sherlock to PATH (Windows)

To run Sherlock globally from any directory, add C:\Users\Admin\AppData\Roaming\Python\Python312\Scripts to your system PATH.

  1. Go to System Properties > Advanced > Environment Variables.
  2. Under System variables, find Path and click Edit.
  3. Add the path: C:\Users\Admin\AppData\Roaming\Python\Python312\Scripts.

Running Sherlock

  1. Open Command Prompt or PowerShell.

  2. To search for a username:

    sherlock <username>

Files

  • osint_sleuth.py: Main script
  • dorks_list.txt: List of Google dorks
  • usernames.txt: Usernames to search
  • requirements.txt: Dependencies
  • LICENSE: Project license

License

MIT License - see LICENSE.

Disclaimer

All information gathered is from publicly accessible sources. This tool is intended for ethical OSINT research, education, and privacy awareness.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages