Skills sherlock
install
source · Clone the upstream repo
git clone https://github.com/TerminalSkills/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/TerminalSkills/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/sherlock" ~/.claude/skills/terminalskills-skills-sherlock && rm -rf "$T"
manifest:
skills/sherlock/SKILL.mdsafety · automated scan (low risk)
This is a pattern-based risk scan, not a security review. Our crawler flagged:
- pip install
Always read a skill's source content before installing. Patterns alone don't mean the skill is malicious — but they warrant attention.
source content
Sherlock
Overview
Sherlock searches for a username across 400+ social networks and websites simultaneously. It reports which platforms have an account with that username, useful for OSINT investigations, brand monitoring, and digital footprint analysis.
Instructions
Installation
pip install sherlock-project
Basic Search
sherlock targetusername
This checks 400+ sites and outputs results to terminal plus a text file.
Output Formats
# CSV output sherlock targetusername --csv # Save to specific file sherlock targetusername --output results.txt # JSON for programmatic use sherlock targetusername --json results.json
Advanced Options
# Search specific sites only sherlock targetusername --site twitter --site github --site instagram # Set timeout (seconds) per site sherlock targetusername --timeout 10 # Use proxy sherlock targetusername --proxy socks5://127.0.0.1:1080 # Multiple usernames sherlock user1 user2 user3
Python API
import sherlock_project from sherlock_project import sherlock results = sherlock.search("targetusername") for site, result in results.items(): if result["status"] == "Claimed": print(f"{site}: {result['url_user']}")
Examples
Example 1: Find all accounts for a username
$ sherlock johndoe2024 [+] GitHub: https://github.com/johndoe2024 [+] Twitter: https://twitter.com/johndoe2024 [+] Instagram: https://instagram.com/johndoe2024 [+] Reddit: https://reddit.com/user/johndoe2024 [-] Facebook: Not Found [+] LinkedIn: https://linkedin.com/in/johndoe2024 ... Found 47 accounts across 400+ sites
Example 2: Brand monitoring
$ sherlock mycompanyname --csv # Outputs CSV with all platforms where the brand name is taken # Useful for trademark protection and consistent brand presence
Guidelines
- Always verify results manually — false positives occur on sites with generic URL patterns
- Respect platform terms of service and rate limits
- Use
for faster scans (some sites are slow)--timeout 5 - For investigations, combine with other OSINT tools (theHarvester, amass) for comprehensive results
- Consider ethical implications — this tool is for legitimate research, not harassment
- Proxy support helps avoid IP-based rate limiting on repeated searches