Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      GHunt: Investigate Google Accounts with emails

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      GHunt is an OSINT tool to extract information from any Google Account using an email.

      It can currently extract:

          Owner’s name
          The last time the profile was edited
          Google ID
          If the account is a Hangouts Bot
          Activated Google services (YouTube, Photos, Maps, News360, Hangouts, etc.)
          Possible YouTube channel
          Possible other usernames
          Public photos (P)
          Phones models (P)
          Phones firmwares (P)
          Installed Softwares (P)
          Google Maps reviews (M)
          Possible physical location (M)
          Events from Google Calendar (C)

      The features marked with a (P) require the target account to have the default setting of Allow the people you share content with to download your photos and videos on the Google AlbumArchive, or if the target has ever used Picasa linked to their Google account.
      More info here.

      Those marked with a (M) require the Google Maps reviews of the target to be public (they are by default).

      Those marked with a (C) requires user to have Google Calendar set on public (default it is closed)

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              AWS Basics
              Cloud Computing Basics
              Internet Security Basics
              VPN Basics
              Build a VPN
              Launch A EC2 Server
          Requirements
              Basic Computer Knowledge
          Description
          VPNs are all the rage these days. But what if I told you that you can build your very own VPN server for free? In this course I'm going to teach you how to do just that. We're also going to tip our toes into cloud computing. AWS is leading the cloud computing market, and in this course we're going to be working with AWS to build our VPN server.

          Who this course is for:
              Beginners To Cloud Computing
              Beginners to AWS
              Anyone looking for a VPN solution
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              What Raspberry Pi
              Where To Buy In Cheap Price
              Setup Raspberry Pi as Portable Hacking Machine
              WIFI Network Jamming
              Protect Your WiFi From Jamming
              WiFi Password Hacking
              Protect Your WiFi Password From Hacking
          Requirements
              Basic Computer & IT Skills
              PC/Laptop/Mobile
              Raspberry Pi and Accesories
              Hacking Attitude
          Description
          In this WiFi Hacking with Raspberry Pi - Black Hat Hackers Special! course, I will teach you how to setup raspberry pi for various type of wifi hacking technics and DIY projects which are used by black hat hackers and ethical hackers too. I designed this course in such a manner that you can easily learn from this course even if you don’t have any previous knowledge about raspberry pi or hacking.
          I can assure you from this course you will learn something new that no one will teach you in any other course. So, Click on Enroll to join this course and start learning how to hack with raspberry pi.
          This course is designed for beginners and professionals, if you are a beginner you want to start from zero or if you are a professional and want to improve your hacking skills so this course will increase your knowledge about hacking.
          In this course, you'll learn how the Black Hat Hackers use the Raspberry Pi to perform various advanced hacking techniques to hack any wifi password no matter it's using any types of security  WEP/WPA/WPA2 Wi-Fi encryption key and also you will learn jamming any wifi connection and disconnect any device from any wifi using the Raspberry Pi.
          Notice: This course is only for educational purposes and all the attacks that have been carried out are in my own Penetration testing lab and against my own devices. Do not perform any hacks on other people's networks if you don't have permission to do so. I will not be responsible for your actions,
          Who this course is for:
              Anyone Who Wants To Become an Ethical Hacker, Penetration Tester or Black Hat Hackers
              Anyone Who Wants To Learn Hacking Using Raspberry Pi Like Black Hat Hackers
              Anyone Who Wants To Learn How To Hack WiFi Passwords Like Black Hat Hackers
              Anyone Who Wants To Learn How To Jam WiFi Like Black Hat Hackers
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              How to use multiple methods to escalate privleges on modern versions of Windows 10
              How to escalate privleges in CTFs such as HackTheBox, TryHackMe and more
              How to succeed in CTF style exams such as the OSCP, eCPPT and CEH
              How to level up your ethical hacking, penetration testing and red teaming skills to earn more money in your career
          Requirements
              A HackTheBox VIP Subscription is Required
              Basic knowledge of virtual machines
          Description
          New Launch for Spring 2021!
          This is a 100% hands on course as you will be using the same tradecraft and techniques Red Teamer's and advanced adversaries use to escalate privileges on Windows endpoints after they have gained initial access and established a foothold. This course is not "death by PowerPoint", in fact there is not a single Powerpoint slide in the course.  This course is aimed for intermediate to advanced users who are hungry to know how to discover and exploit novel escalation paths on patched fully patched Windows 10 endpoints.  Everything is carefully, explained - step-by-step.
          Additionally, although Metasploit is used in some attacks, we will be using less Metasploit and more manual walk-throughs because I wanted to take the time to carefully explain WHY each method works and detail how common misconfigurations happen in enterprise environments.
          Where Metasploit is used, everything is carefully explained and deconstructed so you can understand why and how it works. Exploits start easy and escalate in difficulty as you progress through the course.
          The Techniques
          You will quickly learn and execute the following escalation of privilege techniques across 5 vulnerable machines
              Windows Kernel Exploits
              Weak Registry Permissions
              Token Manipulation
              CVE Exploits
              DPAPI Abuse (Three New Lectures Just Added January 2021!)
          The Tools
          You will use msfvenom, BC Security PowerShell Empire, CrackMapExec, netcat, smbserver, wfuzz, gobuster, dirsearch, sqlmap, Mimikatz, Burp Suite (advanced features), Python 3, Powershell 7 on Linux and more.   You will learn IIS 10 Server Administration, how to threat hunt for SQLi attacks in web logs and much much more.
          My dream for you
          By the end of this course you should be able to use these techniques in:
              Your day to day work
              OSCP preparation
              CTF hacking
          About the lab
          There are 10 vulnerable machines.
          No lab setup is required as the entire environment is already established in HackTheBox VIP labs
          I wanted to make this course as realistic as possible while removing as many barriers to entry as possible so I've partnered with HackTheBox VIP labs to make it as easy as possible to get started.
          Yes, HackTheBox is an additional charge but it offers hundreds of pre-configured vulnerable machines in a lab which is accessible via a VPN connection. This means you can get started right away and don't have to waste time fumbling with VirtualBox and VMWare settings on your local system. Most of the systems are also licensed which provides the best environment for realistic exploitation.
          Tip:
          I made these videos so all commands are zoomed in close so you can watch on a mobile phone if desired. I hate watching videos on my smartphone and squinting at the command prompt or terminal.  Never again will that happen.

          Who this course is for:
              Students interested in how attackers escalate privileges on modern Windows endpoints
              Beginning and Intermediate cyber security students.
              Students looking for OCSP practice
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          So you’ve built an Android app, and you’re ready to share it with the world. Now what? There are many ways you can distribute your app, and in this course, Jon-Luke West shows you how to use the primary distribution channel, the Google Play Store, as well as the Amazon Appstore. Jon-Luke covers how to prepare the app for distribution by cleaning up and optimizing the code, creating a security certificate, and uploading an APK file. He then shows how to create multiple flavors of your app to include different features, how to register as a Google Play and Amazon developer, set the app description and pricing, and publish the app. Lastly, Jon-Luke looks at the post-publishing aspects, including how to track app usage, usage statistics, revenue, and crash reporting.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.