Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata
☆218Jan 19, 2024Updated 2 years ago
Alternatives and similar repositories for MetaFinder
Users that are interested in MetaFinder are comparing it to the libraries listed below
Sorting:
- Get related domains / subdomains by looking at Google Analytics IDs☆251Jun 3, 2022Updated 3 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- Simple Google Dorks search tool☆318Sep 3, 2025Updated 5 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆447Jan 25, 2024Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- Search emails from a domain through search engines☆410Mar 9, 2023Updated 2 years ago
- Find endpoints on GitHub.☆214Mar 28, 2023Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- ☆75Apr 8, 2024Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆505Jul 17, 2022Updated 3 years ago
- De-clutter a list of URLs☆386Feb 3, 2026Updated 3 weeks ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Find subdomains on GitLab.☆107Apr 28, 2024Updated last year
- PoC analyzer of your email address exposure on various services☆65Oct 9, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- Discover new target domains using Content Security Policy☆503Feb 7, 2026Updated 3 weeks ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- ☆544Jun 26, 2024Updated last year
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆232Feb 2, 2026Updated last month
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆454Apr 27, 2022Updated 3 years ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real orig…☆163Feb 22, 2026Updated last week
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆167Jan 6, 2026Updated last month
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆55Nov 21, 2025Updated 3 months ago
- List all public repositories for (valid) GitHub usernames☆76Sep 25, 2023Updated 2 years ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆299Sep 8, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- Static analysis of wordpress plugins☆60Dec 16, 2020Updated 5 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,524Jan 15, 2026Updated last month
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago