Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Overview
  • Sherlock
  • Overview
  • Features
  • Download From Github
  • How to use
  • NameChk
  • Overview
  • Download from Github
  • Web Version
  • CheckUserNames
  1. OSINT

OSINT Username Finder

PreviousGoogle Advanced Search OperatorsNextSocial Media OSINT

Last updated 1 year ago

Overview

An OSINT username finder is a tool that helps you find usernames across multiple online platforms. This can be useful for a variety of purposes, such as:

  • Social media investigations: If you are investigating someone's online activity, you can use an OSINT username finder to find their accounts on social media platforms such as Facebook, Twitter, and Instagram.

  • Cyberbullying: If you are being cyberbullied, you can use an OSINT username finder to find the bully's other online accounts. This can help you gather evidence of the bullying and report it to the appropriate authorities.

  • Identity theft: If you believe that your identity has been stolen, you can use an OSINT username finder to find the accounts that the thief has created using your personal information. This can help you take steps to protect your identity and prevent further damage.

Sherlock

Overview

Sherlock, a powerful command-line tool provided by the Sherlock Project, can be used to find usernames across many social networks. It requires Python 3.6 or higher and works on MacOS, Linux, and Windows.

With Sherlock, you can easily track down social media accounts associated with a particular username, helping you uncover potential connections, online activities, and even possible vulnerabilities. This tool saves time and effort by automating the search process, eliminating the need to manually search each platform individually.

Features

  • Cross-Platform Search: Sherlock supports a wide range of social media platforms, including popular ones like Facebook, Twitter, Instagram, LinkedIn, and more. It offers comprehensive coverage to ensure a thorough search.

  • Username Enumeration: Sherlock leverages a vast collection of APIs and online resources to identify profiles linked to a specific username. It utilizes various techniques and algorithms to provide accurate results.

  • Detailed Results: The tool provides detailed information about each discovered profile, such as profile picture, bio, followers, posts, and other relevant data. This allows you to gain a comprehensive understanding of an individual's online presence.

  • Customization and Extensibility: Sherlock is highly customizable and extensible, allowing users to add new search modules or customize existing ones. This flexibility ensures that you can adapt the tool to your specific needs and preferences.

Download From Github

How to use

NameChk

Overview

Namechk is a free tool that can be used to find usernames across a variety of social media platforms. It also offers a premium plan that provides additional features, such as the ability to find usernames across more platforms and to track changes in usernames.

Download from Github

Web Version

CheckUserNames

To learn about How to use Sherlock OSINT Tool , You can watch created by or created by .

this YouTube Video/Tutorial
NetworkChuck
this YouTube Video/Tutorial
Null Byte
LogoSherlock Project
LogoGitHub - sherlock-project/sherlock: 🔎 Hunt down social media accounts by username across social networksGitHub
LogoGitHub - GONZOsint/Namechk: Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks.GitHub
LogoNamechk - Username and Domain Name Checker - Search All Domain Names and User Names to see if they're availableNamechk
LogoCheckUsernames Searches over 100 Social Networks - KnowEm.com searches over 500Check Usernames