Ghunt
A command line tool for obtaining information about Google accounts.
Last updated
Was this helpful?
A command line tool for obtaining information about Google accounts.
Last updated
Was this helpful?
GHunt is an open-source tool designed to gather detailed information about Google accounts using the target's Gmail address. By using publicly accessible data, Ghunt surfaces various aspects of a Google user's digital footprint, including their YouTube channels, Google Photos, Google Maps reviews, and more. By analyzing this information, GHunt can provide insights into the target's online activities and digital footprint.
The easiest way to authenticate into Ghunt is to use authentication option 2 alongside the Ghunt browser extension. After selecting option 2, go to your browser extension and obtain the base64-encoded credentials. You can use these to authenticate to Ghunt.
Once authenticated, you have the following search options:
email: Get information on an email address.
drive: Get information on a Drive file or folder.
"mxrch", self-described as "a group of cybersecurity enthusiasts" and a Capture the Flag (CTF) "team from France founded in 2019".
hande
Ghunt has two supported browser extensions for and .
The developers have provided 2 scripts that leverage the tool .
gaia: Get information on a .
geolocate: Geolocate a .
Need to install in your environment; the download instructions on Ghunt's Github asks you to do this as well.
Since April 2024, Ghunt no longer shows the name of the account holder in the results it returns. Ghunt developers that this was a feature that Google has actively tried to block and advised users to not expect the return of this feature.
Some social media users have that the removal of this feature may be related to an April 2024 by the Guardian which identified the head of Israel's Unit 8200, an Israeli Intelligence Corps unit of the Israel Defense Forces (IDF). According to the investigative methodology described in the article, Ghunt may have been used to identify Sariel.
This project is under . The developers require that it is used "only in personal, criminal investigations, pentesting, or open-source projects."
Jake Creps:
Joseph Jones:
Github:
Twitter:
Website: