Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks.
What is the tool employed by James in the above scenario?
blacksheep6r
Highly Voted 1 year, 6 months agoemrys
Highly Voted 1 year, 10 months agoDaniel8660
Most Recent 6 months, 3 weeks agoderekqqirr
1 year, 1 month agocrispi
1 year, 2 months agoScryptic
1 year, 8 months agoANDRESCB1988
1 year, 9 months agoTara8595
1 year, 10 months ago[Removed]
1 year, 11 months agoorabeya
1 year, 11 months agocritows
1 year, 5 months ago