Termux Sherlock - Find Usernames Across Social Networks

Termux Sherlock - Find Usernames Across Social Networks

sherlock github termux
sherlock github termux

Installation

NOTE: Python 3.6 or higher is required.

  • # clone the repo
    $ git clone https://github.com/sherlock-project/sherlock.git

    # change the working directory to sherlock
    $ cd sherlock

    # install python3 and python3-pip if not exist

    # install the requirements
    $ pip3 install -r requirements.txt
sherlock termux
sherlock termux
sherlock termux 2023
شرح ngrok termux
termux apk شرح
termux scripts
سكربت termux
termux للاندرويد
telecharger أوامر termux
install sherlock in termux
شروحات termux
github/sherlock
github sherlock termux
como instalar sherlock en termux
sherlock termux command
sherlock para termux

Usage

  • $ python3 sherlock.py --help
    usage: sherlock.py [-h] [--version] [--verbose] [--rank]
                       [--folderoutput FOLDEROUTPUT] [--output OUTPUT] [--tor]
                       [--unique-tor] [--csv] [--site SITE_NAME]
                       [--proxy PROXY_URL] [--json JSON_FILE]
                       USERNAMES [USERNAMES ...]

    Sherlock: Find Usernames Across Social Networks (Version 0.6.4)

    positional arguments:
      USERNAMES             One or more usernames to check with social networks.

    optional arguments:
      -h, --help            show this help message and exit
      --version             Display version information and dependencies.
      --verbose, -v, -d, --debug
                            Display extra debugging information and metrics.
      --rank, -r            Present websites ordered by their Alexa.com global
                            rank in popularity.
      --folderoutput FOLDEROUTPUT, -fo FOLDEROUTPUT
                            If using multiple usernames, the output of the results
                            will be saved at this folder.
      --output OUTPUT, -o OUTPUT
                            If using single username, the output of the result
                            will be saved at this file.
      --tor, -t             Make requests over TOR; increases runtime; requires
                            TOR to be installed and in system path.
      --unique-tor, -u      Make requests over TOR with new TOR circuit after each
                            request; increases runtime; requires TOR to be
                            installed and in system path.
      --csv                 Create Comma-Separated Values (CSV) File.
      --site SITE_NAME      Limit analysis to just the listed sites. Add multiple
                            options to specify more than one site.
      --proxy PROXY_URL, -p PROXY_URL
                            Make requests over a proxy. e.g.
                            socks5://127.0.0.1:1080
      --json JSON_FILE, -j JSON_FILE
                            Load data from a JSON file or an online, valid, JSON
                            file.
      --print-found
                Prints only found messages. Errors, and invalid
                username errors will not appear.
For example, run python3 sherlock.py user123, and all of the accounts found will be stored in a text file with the username (e.g user123.txt).

Tests
If you are contributing to Sherlock, then Thank You!

Before creating a pull request with new development, please run the tests to ensure that all is well. It would also be a good idea to run the tests before starting development to distinguish problems between your environment and the Sherlock software.

The following is an example of the command line to run all the tests for Sherlock. This invocation hides the progress text that Sherlock normally outputs, and instead shows the verbose output of the tests.

$ python3 -m unittest tests.all --buffer --verbose
Note that we do currently have 100% test coverage. Unfortunately, some of the sites that Sherlock checks are not always reliable, so it is not uncommon to get response errors.
 
Shadow Hacker
بواسطة : Shadow Hacker
Shadow Hacker هي قناة تعليمية حيث أحاول تعليم المبتدئين كل ما هوا مفيد في مجال الهكر والحمايه والمعلوميات ، من خلال شرح البرامج المهمة وبعض من خدمات المواقع ، والتعريف بأفضل طرق الأختراق والحمايه الأنظمة والحسابات ... اذا كان لديك اي استفسار لا تتردد في الأتصال بي
تعليقات



حجم الخط
+
16
-
تباعد السطور
+
2
-