explaingit

mxrch/ghunt

18,945PythonAudience · developerComplexity · 3/5MaintainedSetup · moderate

TLDR

Python tool for gathering public information about Google accounts and services using OSINT techniques, designed for security research and authorized investigations.

Mindmap

mindmap
  root((repo))
    What it does
      Google account lookup
      Drive file search
      Wi-Fi geolocation
      Digital assets discovery
    How it works
      Browser extension auth
      Uses your Google session
      Async queries
    Use cases
      Security research
      Penetration testing
      OSINT investigations
    Tech stack
      Python 3.10+
      Async framework
      Browser extension

Things people build with this

USE CASE 1

Research what public information is linked to a Google email address during authorized security assessments.

USE CASE 2

Find shared Google Drive files and folders associated with a target account for OSINT investigations.

USE CASE 3

Locate Wi-Fi access points and their geographic locations using network identifiers for physical security research.

USE CASE 4

Discover connected digital assets and services linked to a Google account for comprehensive account profiling.

Tech stack

PythonAsync/awaitFirefoxChrome

Getting it running

Difficulty · moderate Time to first run · 30min

Requires Firefox or Chrome browser installation and Python dependencies; may need Selenium/WebDriver setup for browser automation.

License could not be detected automatically. Check the repository's LICENSE file before use.

In plain English

GHunt is an open-source OSINT (Open Source Intelligence) tool focused on extracting publicly available information from Google accounts and services. OSINT means gathering information using only public data sources, without hacking or unauthorized access. The tool is described as an "offensive Google framework," designed for security research, penetration testing (authorized testing of a system's defenses), and investigations. With GHunt, you can look up information associated with a Google email address, a Google account ID (called a Gaia ID), shared Google Drive files or folders, and Wi-Fi geolocation data using a BSSID (a network identifier for a specific Wi-Fi access point). It can also find connected digital assets using Digital Assets Links. Results can be exported to JSON for further analysis. Authentication works through a browser extension (available for Firefox and Chrome) that passes your own Google session cookies to the tool, so it uses your logged-in Google session to make queries that a normal user could make, rather than exploiting vulnerabilities. You would use this for security research, investigating accounts during authorized penetration tests, or OSINT investigations. The tool is intended only for educational purposes and lawful use. It's written in Python (3.10 or newer required), fully asynchronous for speed, and can be used both as a command-line tool and as a Python library.

Copy-paste prompts

Prompt 1
How do I install GHunt and set up the browser extension to authenticate with my Google session?
Prompt 2
Show me how to query a Google email address with GHunt and export the results to JSON.
Prompt 3
How can I use GHunt to find all shared Google Drive files associated with a specific Gaia ID?
Prompt 4
What information can GHunt extract about Wi-Fi networks using a BSSID, and how do I use that feature?
Prompt 5
How do I use GHunt as a Python library in my own security research scripts?
Open on GitHub → Explain another repo

Generated 2026-05-18 · Model: sonnet-4-6 · Verify against the repo before relying on details.