Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.

It Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location Permission and if the target allows it, we can get :

  • Longitude
  • Latitude
  • Accuracy
  • Altitude – Not always available
  • Direction – Only available if user is moving
  • Speed – Only available if user is moving

Along with Location Information we also get Device Information without any permissions :

  • Operating System
  • Platform
  • Number of CPU Cores
  • Amount of RAM – Approximate Results
  • Screen Resolution
  • GPU information
  • Browser Name and Version
  • Public IP Address
  • IP Address Reconnaissance

This tool is a Proof of Concept and is for Educational Purposes Only, it shows what data a malicious website can gather about you and your devices and why you should not click on random links and allow critical permissions such as Location etc.

Also Read – Brave Browser – Secure, Fast & Private Web Browser with Adblocker

How is this Different from IP GeoLocation?

  • Other tools and services offer IP Geolocation which is NOT accurate at all and does not give location of the target instead it is the approximate location of the ISP.
  • It uses HTML API and gets Location Permission and then grabs Longitude and Latitude using GPS Hardware which is present in the device, so it works best with Smartphones, if the GPS Hardware is not present, such as on a Laptop, it fallbacks to IP Geolocation or it will look for Cached Coordinates.
  • Generally if a user accepts location permsission, Accuracy of the information recieved is accurate to approximately 30 meters, Accuracy Depends on the Device.

Note : On iPhone due to some reason location accuracy is approximately 65 meters.

Tested On :

  • Kali Linux 2019.2
  • BlackArch Linux
  • Ubuntu 19.04
  • Kali Nethunter
  • Termux
  • Parrot OS

Installation

Kali Linux / Ubuntu / Parrot OS

git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod 777 install.sh
./install.sh

BlackArch Linux

pacman -S seeker

Docker

# Install docker
curl -fsSL https://get.docker.com -o get-docker.sh sh get-docker.sh

# Build Seeker
cd seeker/ docker build -t seeker .

# Launch seeker
docker run -t –rm seeker

# OR Pull from DockerHub
docker pull thewhiteh4t/seeker
docker run -t seeker

Termux

git clone https://github.com/thewhiteh4t/seeker.git
cd seeker/
chmod 777 termux_install.sh
./termux_install.sh

Usage

python3 seeker.py -h

usage: seeker.py [-h] [-s SUBDOMAIN]

optional arguments:
-h, –help show this help message and exit
-s SUBDOMAIN, –subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, –kml KML Provide KML Filename ( Optional )
-t TUNNEL, –tunnel TUNNEL Specify Tunnel Mode [manual]

#Example

#SERVEO
##########

python3 seeker.py

#NGROK ETC.
#############

>> In First Terminal Start seeker in Manual mode like this
python3 seeker.py -t manual

>>In Second Terminal Start Ngrok or any other tunnel service on port 8080
./ngrok http 8080
————————————————–
#Subdomain
#############

python3 seeker.py –subdomain google
python3 seeker.py –tunnel manual –subdomain zomato

Known Problems

  • Services like Serveo and Ngrok are banned in some countries such as Russia etc., so if it’s banned in your country you may not get a URL, if not then first READ CLOSED ISSUES, if your problem is not listed, create a new issue.

Demo

R K

Recent Posts

SpyAI : Intelligent Malware With Advanced Capabilities

SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…

1 day ago

Proxmark3 : The Ultimate Tool For RFID Security And Analysis

The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…

1 day ago

Awesome Solana Security : Enhancing Program Development

The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…

1 day ago

IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…

1 day ago

AdaptixC2 : Enhancing Penetration Testing With Advanced Framework Capabilities

AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…

1 day ago

Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation

Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…

1 day ago