Research what public information is linked to a Google email address during authorized security assessments.
Find shared Google Drive files and folders associated with a target account for OSINT investigations.
Locate Wi-Fi access points and their geographic locations using network identifiers for physical security research.
Discover connected digital assets and services linked to a Google account for comprehensive account profiling.
Requires Firefox or Chrome browser installation and Python dependencies; may need Selenium/WebDriver setup for browser automation.
GHunt is an open-source OSINT (Open Source Intelligence) tool focused on extracting publicly available information from Google accounts and services. OSINT means gathering information using only public data sources, without hacking or unauthorized access. The tool is described as an "offensive Google framework," designed for security research, penetration testing (authorized testing of a system's defenses), and investigations. With GHunt, you can look up information associated with a Google email address, a Google account ID (called a Gaia ID), shared Google Drive files or folders, and Wi-Fi geolocation data using a BSSID (a network identifier for a specific Wi-Fi access point). It can also find connected digital assets using Digital Assets Links. Results can be exported to JSON for further analysis. Authentication works through a browser extension (available for Firefox and Chrome) that passes your own Google session cookies to the tool, so it uses your logged-in Google session to make queries that a normal user could make, rather than exploiting vulnerabilities. You would use this for security research, investigating accounts during authorized penetration tests, or OSINT investigations. The tool is intended only for educational purposes and lawful use. It's written in Python (3.10 or newer required), fully asynchronous for speed, and can be used both as a command-line tool and as a Python library.
Generated 2026-05-18 · Model: sonnet-4-6 · Verify against the repo before relying on details.