About
Geogramint is an OSINT tool that uses Telegram’s API to find nearby users and groups. Inspired by Tejado’s Telegram Nearby Map, which is no longer maintained, it aims to provide a more user-friendly alternative.
Geogramint only finds Telegram users and groups which have activated the nearby feature. Per default it is deactivated.
The tool is fully supported on Windows and partially supported on Mac OS and Linux distributions.
🛠️ Installation
Requirements: Python 3.8 or 3.9
On Windows
With the installer: Click here!
With Github:
git clone https://github.com/Alb-310/Geogramint.git
cd Geogramint/
pip3 install -r requirements.txt
python3 geogramint.py
Or depending on your installation :
git clone https://github.com/Alb-310/Geogramint.git
cd Geogramint/
pip install -r requirements.txt
python geogramint.py
On Mac OS and Linux
git clone https://github.com/Alb-310/Geogramint.git
cd Geogramint/
pip3 install -r requirements.txt
python3 geogramint.py
Or depending on your installation :
git clone https://github.com/Alb-310/Geogramint.git
cd Geogramint/
pip install -r requirements.txt
python geogramint.py
More details in the Wiki.
📡 Example
- Start by creating an API key for your Telegram account here. You will also need to put a profile picture on your account and, in your
Privacy and Security
settings, enable the profile picture for everyone.
- Launch Geogramint
- In the settings, write your information (api_id, api_hash and phone number) and then
save
- Choose the location where you want to search, either by moving around the map or by using the search feature with coordinates in
lat, lon
format
- Telegram will send you a verification code, write it in the pop-up window (+ your two-step verification password if you have one)
- Then click
Start Search
- All results will be displayed following:
- green for 500m
- yellow for 1000m
- orange for 2000m
- red for >3000m
(NB: results can also be found in Geogramint/cache_telegram/
in json
format + profiles pictures)
Reset
will clear the results and erase thecache_telegram
More details in the Wiki.
Subscribe to our channel and do not miss new collections of tools in various areas of Information Security.
Posted by: @ESPYER