Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata
☆218Jan 19, 2024Updated 2 years ago
Alternatives and similar repositories for MetaFinder
Users that are interested in MetaFinder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Get related domains / subdomains by looking at Google Analytics IDs☆251Jun 3, 2022Updated 3 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Simple Google Dorks search tool☆319Sep 3, 2025Updated 6 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆448Jan 25, 2024Updated 2 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Search emails from a domain through search engines☆411Mar 9, 2023Updated 3 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Find endpoints on GitHub.☆215Mar 28, 2023Updated 2 years ago
- PoC analyzer of your email address exposure on various services☆65Oct 9, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆77Sep 25, 2023Updated 2 years ago
- ☆74Apr 8, 2024Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆508Jul 17, 2022Updated 3 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Discover new target domains using Content Security Policy☆508Mar 16, 2026Updated last week
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Find subdomains on GitLab.☆107Apr 28, 2024Updated last year
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- De-clutter a list of URLs☆385Mar 8, 2026Updated 2 weeks ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- Dump all available paths and/or endpoints on WADL file.☆98Nov 24, 2025Updated 3 months ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆454Apr 27, 2022Updated 3 years ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆562Mar 8, 2025Updated last year
- ☆44Apr 30, 2021Updated 4 years ago
- ☆544Jun 26, 2024Updated last year
- Identify virtual hosts by similarity comparison☆137Updated this week
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping☆1,486Nov 26, 2024Updated last year
- CrlfiX☆21Jan 30, 2025Updated last year
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆235Mar 16, 2026Updated last week