{"id":556,"date":"2021-12-21T16:16:24","date_gmt":"2021-12-21T16:16:24","guid":{"rendered":"https:\/\/news4hacker.com\/?p=556"},"modified":"2023-04-19T09:26:09","modified_gmt":"2023-04-19T09:26:09","slug":"how-to-track-anyones-live-location-using-seeker-2021-n4h","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-track-anyones-live-location-using-seeker-2021-n4h\/","title":{"rendered":"How to track anyone&#8217;s live location using seeker | Recon Cyber Security"},"content":{"rendered":"\n<p>In this article, you will see how you can track someone&#8217;s exact location with Seeker. This is a famous tool because it works like that it has to be famous. When you send a link to the victim made by this tool then you will receive the longitude and latitude of the victim&#8217;s location and you can see his\/her location by pasting those directions. So let&#8217;s start!<\/p>\n\n\n\n<h2 id=\"installing-the-tool\" class=\"wp-block-heading\">Installing the Tool<\/h2>\n\n\n\n<p>So first, open any browser and search <strong>seeker GitHub<\/strong> then go to the 1st website copy the code from there as we always do. If you want to go directly to this website so click on this link ( <a href=\"https:\/\/github.com\/thewhiteh4t\/seeker\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/thewhiteh4t\/seeker<\/a> ).<\/p>\n\n\n\n<p>Open your terminal and go to the destination where you have to clone your tool. We are cloning our tool on our Desktop so we are typing ( <strong>cd Desktop<\/strong> ) after that clone your tool by typing ( <strong>git clone &lt;your code&gt;<\/strong> )\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/12\/Screenshot_20211222_024858-1024x252.png\" alt=\"\" class=\"wp-image-568\"\/><\/figure>\n\n\n\n<p>Now for going inside the tool&#8217;s directory type (<strong> cd seeker <\/strong>) then install the dependencies by typing (<strong> .\/install.sh<\/strong> ) and now wait for completing it\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/12\/Screenshot_20211222_025249-1024x292.png\" alt=\"\" class=\"wp-image-569\"\/><\/figure>\n\n\n\n<h2 id=\"performing-the-tool\" class=\"wp-block-heading\">Performing the Tool<\/h2>\n\n\n\n<p>Now, all set you can start your tool with this command ( <strong>python3 seeker.py<\/strong> ). If your tool is not running by this command so try this ( <strong>python3 seeker.py -t manual<\/strong> ), maybe by typing this command your tool will start\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/12\/Screenshot_20211222_025529-1024x365.png\" alt=\"\" class=\"wp-image-573\"\/><\/figure>\n\n\n\n<p>Here you can see four options, you can choose anyone we are using the<strong> NearYou<\/strong> option so we are typing <strong>(0)<\/strong> here\u2026<\/p>\n\n\n\n<p>Don&#8217;t be happy, because your tool doesn&#8217;t give you a direct link for sending to the target. So what would you do now? don&#8217;t worry we had fix this issue. For making the link we have to manually install ngrok and we had actually made a blog on it. In that blog we told you that how to setup and make a link by manually if the tool doesn&#8217;t give you link. So you can check that blog out for solving this issue&#8230;  <\/p>\n\n\n\n<p>Link of the blog &#8211; <a href=\"https:\/\/reconcybersecurity.com\/blog\/how-to-install-and-use-ngrok-2021-n4h\/\"> https:\/\/reconcybersecurity.com\/blog\/how-to-install-and-use-ngrok-2021-n4h\/<\/a><\/p>\n\n\n\n<p>Now open your directory where you save the ngrok after extracting it and paste that file into seeker&#8217;s directory. Then open your terminal and go inside your seeker&#8217;s folder now type a command here ( <strong>.\/ngrok http 8080<\/strong> ), After that you will get two links here you have to copy the 2nd link and send it to your target\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/12\/Screenshot_20211222_030651-1024x86.png\" alt=\"\" class=\"wp-image-574\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/12\/Screenshot_20211221_235550-1024x291.png\" alt=\"\" class=\"wp-image-575\"\/><\/figure>\n\n\n\n<p>Come to your first terminal and now when the target opens that link you will get all information about him. When you scroll down your terminal page you can see a link that is highlighted by google maps just copy it send it to your target\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/12\/Screenshot_20211222_000133-1024x254.png\" alt=\"\" class=\"wp-image-576\"\/><\/figure>\n\n\n\n<p>Congratulations! now you can see your victim&#8217;s location where he goes and enjoy the success \ud83d\udc4d<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you have any problem with our blog so you can comment to us we will try to fix it.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"In this article, you will see how you can track someone&#8217;s exact location with Seeker. This is a&hellip;\n","protected":false},"author":1,"featured_media":10886,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10],"tags":[108,109,110,111,112,113,114],"class_list":{"0":"post-556","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"tag-hack-exact-location","9":"tag-hacking-location","10":"tag-how-to-hack-location-of-someone","11":"tag-how-to-use-seeker","12":"tag-location-hacking-tool","13":"tag-location-tracking-tool","14":"tag-track-exact-location"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=556"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/556\/revisions"}],"predecessor-version":[{"id":10637,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/556\/revisions\/10637"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10886"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}