• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2019
  • October
  • 9
  • GeoSpy – OSINT analysis and research tool for social engineering attacks

GeoSpy – OSINT analysis and research tool for social engineering attacks

October 9, 2019 Comments Off on GeoSpy – OSINT analysis and research tool for social engineering attacks
geospy osint geospy tutorial how to use geospy

Geolocation Spy (GeoSpy) is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control their users through their browser, without their knowlege, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals.


Some benefits

  • LOCATOR OPTIMIZATION Trace the path between you and the target you’re tracking. Each time you make a move, the path will be updated, the location of the target is obtained silently through a bypass made in the browsers, allowing you to skip the location request on the victim’s side, and at the same time maintain a precision of 99% in the locator.
  • APPROACH When you’re close to the target, GeoSpy will tell you.
  • REST API Generates an API (random or custom), and through this you can control and monitor other Web sites on the Internet remotely, getting the traffic of all visitors.
  • PROCESS HOOKS Manages social engineering attacks or processes in the target’s browser.
  • SEVERAL You can issue a phishing attack of any domain or service in real time as well as send malicious files to compromise the device of a target.
  • INJECT JS You keep the JavaScript code running free in real time, so you can manage the execution of a keylogger or your own custom functions in JS which will be reflected in the target’s browser.
  • SPEECH A process of audio creation is maintained which is played in the browser of the target, by means of this you can execute personalized messages in different voices with languages in Spanish and English.
  • PUBLIC NETWORK TUNNEL GeoSpy has its own API that is linked to ngrok.com to allow the automatic management of public network tunnels. So you can publish the content of your GeoSpy server which is executed locally to the Internet, to manage hooks or public attacks.
  • CLICK ATTACK TO GET CREDENTIALS Automatically obtains the target credentials, recognizing your connection availability on a social network or Internet service.
  • NETWORK You can get information about the user’s network.
  • SPEED Viewing the target’s network speed. (Ping, download, upload, type connection)
  • HOSTS OR DEVICES Here you can get a scan of all the devices that are connected in the target network automatically.
  • PROFILE Brief summary of the target’s behavior and important additional information about your device.

30 sessions recognition

Session recognition is one of GeoSpy most interesting attractions, since you as a researcher can know remotely what service the target is connected to.

  • USABILITY You can delete logs and view alerts for each process or action you run against each target.

Getting started

  • INSTALLATION
cd geospy
chmod +x install.sh
./install.sh
  • UNINSTALLATION
cd geospy
chmod +x uninstall.sh
./uninstall.sh
  • EXECUTION
geospy -h
  • USAGE
usage: geospy [-h] [-v] [-u URL] [-p PORT] [-ak ACCESSKEY] [-l LOCAL] [-n] 
              [-ic INJC] [-ud]

optional arguments:
  -h, --help            show this help message and exit
  -v, --version         show program's version number and exit
  -u URL, --url URL     Put the web page URL to clone.
  -p PORT, --port PORT  Insert your port.
  -ak ACCESSKEY, --accesskey ACCESSKEY
                        Insert your custom Access Key.
  -l LOCAL, --local LOCAL
                        Insert your home file.
  -n, --ngrok           Insert your ngrok Authtoken.
  -ic INJC, --injectcode INJC
                        Insert your custom REST API path.
  -ud, --update         Update GeoSpy to the latest version.

–url In this option you add the URL you want to clone, which works as a decoy.

–port Here you insert the port, where you are going to run the GeoSpy Server.

–accesskey You enter a custom key for the GeoSpy Panel, if you do not insert it will generate an automatic key.

–injectcode GeoSpy contains a REST API to play anywhere, using this option you can customize the name of the file to include, if it does not, generates a random name allusive to a token.

–local Using this option you can call a local HTML file, this is the replacement of the –url option made to run a local link in GeoSpy.

–ngrok In this option you can enter a token, to run at the time of a process. This would replace the token saved in configurations.

–version You can see the version number of GeoSpy.

–update Option used to upgrade to the latest version of GeoSpy.

–help It is used to see all the above options, from the executable.

  • EXAMPLE
geospy --url http://example.com --port 80

Also read: Camelishing – Social Engineering Tool

Download Geospy

You can read more about geospy and download the tool here

Post navigation

Cazador – WebApp Pentest Toolkit
Watson – Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities

Related Articles

CredSniper – Phishing Framework with 2FA Token Support

- Phishing, Social Engineering
December 30, 2017July 27, 2019

Cartero – Social Engineering Framework

- Hack Tools, Social Engineering
November 3, 2017November 18, 2017

SET v7.7 – The Social-Engineer Toolkit “Blackout”

- Hack Tools, Social Engineering
July 18, 2017November 18, 2017
hacker gadgets
hacker phone covers

Recent Posts

Suborner - The Invisible Account Forger

Suborner – The Invisible Account Forger

February 2, 2023
DefaScan: Defacement Scan and Alert

DefaScan: Defacement Scan and Alert

February 2, 2023
curio: finds risks and vulnerabilities in your code

curio: finds risks and vulnerabilities in your code

February 1, 2023
Monomorph - MD5-Monomorphic Shellcode Packer - All Payloads Have The Same MD5 Hash

Monomorph – MD5-Monomorphic Shellcode Packer – All Payloads Have The Same MD5 Hash

February 1, 2023
A Guide to Crypto Self-Custody

A Guide to Crypto Self-Custody

February 1, 2023
CVE-2023-23924: Critical-Severity RCE Flaw Found in Popular Dompdf Library

CVE-2023-23924: Critical-Severity RCE Flaw Found in Popular Dompdf Library

February 1, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW