• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Pentest 🔖 Subdomain Enumeration - Google Analytics

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
27
Reaction score
45,546
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
🔖 Subdomain Enumeration - Google Analytics

🚀 Created for the Hack Tools Dark Community

The AnalyticsRelationships tool allows you to discover subdomains and connected domains sharing the same Google Analytics tracking code.
This technique is effective for uncovering related assets during OSINT and recon phases.

  • 📱 Tool Used:
    This link is hidden for visitors. Please Log in or register now.
  • ⬇️ Installation & Usage

    Bash:
    # Installation
    git clone https://github.com/Josue87/AnalyticsRelationships.git
    cd AnalyticsRelationships/Python
    sudo pip3 install -r requirements.txt
    
    # Usage
    python3 analyticsrelationships.py -u https://www.example.com

This method is particularly useful when traditional subdomain enumeration hits a dead end. Tracking codes like `UA-XXXXX` or `G-XXXXXX` can be shared across different services and environments—giving valuable leads.


⚠️ Disclaimer
This guide is intended solely for educational and ethical hacking purposes.
Unauthorized probing or access to third-party assets is illegal.
Hack Tools Dark Community and the post author are not responsible for any misuse.
Use responsibly and within the bounds of the law.


💬 Drop your findings, tips, or alternative tools below — let’s expand our recon arsenal together.
 
Back
Top