Hunt Down Social media accounts by username Across Social media . . .
The Superfast, we're going to use a python hacking tool to find social media accounts and I'll show you what 5 minutes. Here we go. Now, disclaimer, don't do this to anyone with illigal intent. This is a legit hacking tool part of the hacking process called ho sense where we gather information about our hacking targets. Now, what we're doing is not technically illegal. We're just Gathering publicly available information on the internet, but the lines can blur based on your attention. So just be careful use this as a learning tool but beyond that, Let's start hacking.
Speaking of hacking, let's make sure we hack that YouTube's algorithm today. Smash that like button. If you do like the write up, of course. Follow me on instagram , make comment, all that stuff. Attack you to ethically. Of course. Anyways, here we go. Now, the best part about this is that you don't need anything to do it. All you need is a web browser. In fact, that you're reading this write up. You can do it from your phone. It's really cool. Now this tool you can install on Callie like you can it's a tool called "Sherlock" at all. You need is Python 3 installed on a Linux distribution can be Callie?
Beep air. It can be a boon to whatever or it could be nothing and I'll show you how to do that right now.
Step 1. Let’s go to GitHub. I give that link
Gooo that’s a link 😂
Let's go to the Sherlock tool. Now the scroll down to about here and zoom in a bit on a Linux machine. You'll just run these commands and your solid or or this is amazing. Just click on open in Google Cloud shell. It's free. Just click on it right now. Log into your Google account. You'll need that who doesn't have one of those. Seriously, click agree, and start your Cloud shell, and this is actually launching in Google's Cloud platform. Don't worry. You're not paying anything for this is free. It's a cool thing. They do you're getting a free Linux machine to play around with right now and look at it. There it goes. There it is.
Now for Step 2. We're going to install the requirements. That's just one command. No big deal. No worries. In fact, you can go back here and copy the command is just right here.
Python, 3 - M pip install - our requirements.txt
copy that ...
Ctrl-V to paste and boom. It's in there. I'm going to enter and it's resistance Lama requirements right now. It's going. And that's it. The tools ready. We are ready and Google, Cloud. Completely free. Isn't that amazing? It is, thank you. Okay, here we go. Let's start using Sherlock to find social media accounts. Now, we'll only one thing, a username someone wants to find. I've got a few people in mind. The first, let me show you how to get some help. So we'll enter
a [ Python 3, Sherlock - - help ] and it tells you how to use it, all that good stuff. And now I'll show you how to use it right now. Well, again, Type in [ Python 3. Sherlock, and then simply will put the username of the person we're trying to find in there.] The first one I want to do is knock opsec. He's a well-known hacker. He's been on the channel. If you don't follow him, go follow him. In fact, Nam Khan, I think it's like you say, it is coming up pretty soon. Anyways, all good fun. That's all I do. I'm going to hit enter and watch the magic happen.
It's going to go through all the well-known social media websites and see if not homesick actually has an account on these places on these, the cap places lights. This sides. I can't talk to me. Now, notice. It's going kind of slow. It kind of stopped that chefs. I don't have time for that. So when they control C to interrupt that business, I'm going to speed things up a bit. So just after Sherlock, I'm going to add the command [- - timeout and add in a 1. ] So it's only going to spend one second per website. Anyways, here we go. Go much faster, much better, and it's done. I can now see all these
Social media websites that not homesick, might have an account on know, again. This information is public, but if you are packing someone or a company legally with permission, of course, that's the only way you can do it as an only way you're allowed to do it. But in the case that you're doing gathering information, like this could lead to possible. Vulnerabilities possible. Footholds. Let's do some one else. If I type in LS, in this directory, I can see that it also produced a file for me where to go. There. It is not homesick.txt, if I look at that file. It's save my results. I can see all his sights. Apparently he plays chess we could use that against it. Let's try someone else. [ python3 Sherlock - - time out 1 ] and we'll do the Cybermen to work. Another awesome. Well don't hacker. Let's try it now bam. We got all his info. Let's try someone else. I'll try John Hammond.
Another amazing hacker and go, I would say they all have chessick outside out. They actually do. Let me go see ya. That's bull that's bogus. So, it's not perfect. And that was Sherlock, an amazing python hacking tool we can use to find social media accounts, information on our hacking targets. Now, again, don't use this with ill intent, to use it, to learn have a bit of fun with it. But if you're seriously trying to hack someone or a company, make sure you have explicit permission. I'm talking like they hired you. There's a contract, the whole nine.
Otherwise, you could get the trouble. Anyways, it's all God. Catch you guys later.
Note :- it’s only for a educational purposes if you’re make any cybercrime I am not responsible for that …
Regards by Prabal Jaat
Do follow my page gittools