Tool
CLI
Threat Intelligence

GHunt

by mxrch

16.7Kstars
1.4Kforks
530watchers
Updated 7 months ago
About

GHunt is an offensive Google framework designed for efficient OSINT gathering and automation related to Google accounts and services.

🕵️‍♂️ Offensive Google framework.

Primary Use Case

GHunt is primarily used by security researchers, penetration testers, and OSINT analysts to gather detailed information about Google accounts, email addresses, Drive files, and geolocation data. It facilitates automated reconnaissance and data extraction from Google-related sources to support investigations and threat intelligence activities.

Key Features
  • Offensive Google framework focused on OSINT
  • CLI and Python library usage
  • Fully asynchronous operations
  • JSON export support for data output
  • Browser extension (GHunt Companion) for streamlined Google login
  • Modules for email, Gaia ID, Drive files, geolocation, and digital asset discovery
  • Compatible with Python 3.10+ and Python 3.13

Installation

  • Install pipx: pip3 install pipx
  • Ensure pipx path: pipx ensurepath
  • Install GHunt via pipx: pipx install ghunt

Usage

>_ ghunt login

Authenticate GHunt to Google using either listening mode, pasting base64-encoded cookies, or manual cookie entry.

>_ ghunt email <email_address> --json user_data.json

Retrieve information about an email address and export the results in JSON format.

>_ ghunt gaia <gaia_id> --json output.json

Get information on a Gaia ID with optional JSON export.

>_ ghunt drive <file_or_folder_id> --json output.json

Extract details about a Google Drive file or folder with JSON export capability.

>_ ghunt geolocate <BSSID> --json output.json

Geolocate a BSSID and export the data in JSON format.

>_ ghunt spiderdal

Discover assets using Digital Assets Links.

Security Frameworks
Reconnaissance
Resource Development
Collection
Credential Access
Discovery
Usage Insights
  • Integrate GHunt with threat intelligence platforms to automate Google account reconnaissance during red team engagements.
  • Use GHunt's JSON output to feed blue team monitoring tools for early detection of targeted reconnaissance activities.
  • Leverage the GHunt Companion browser extension to streamline authentication during OSINT investigations.
  • Combine GHunt with social engineering simulations to enhance security awareness training and phishing defense.
  • Employ GHunt modules in purple team exercises to validate detection capabilities against real-world reconnaissance techniques.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about GHunt. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team85%
Blue Team35%
Purple Team60%
Details
LicenseOther
LanguagePython
Open Issues412
Topics
osint
google
hideandsec