kurobeats / metagoofil
Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belonging to a target company.
☆15Updated 10 years ago
Alternatives and similar repositories for metagoofil:
Users that are interested in metagoofil are comparing it to the libraries listed below
- SMS Spoofer for Social Engineering/Pentest Engagements☆44Updated 7 years ago
- Information Gathering Tool☆54Updated 2 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆76Updated 4 months ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- Information Gathering Tool☆35Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 2 years ago
- Information gathering tool - OSINT☆35Updated 6 years ago
- ☆34Updated 8 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆66Updated 7 years ago
- Hacking Tools Z0172CK☆31Updated last year
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 4 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆29Updated 5 years ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆34Updated 4 years ago
- thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TV's, Fridge…☆63Updated last year
- An OSINT tool to gather information about the real owner of a phone number☆47Updated 4 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- BlueHunter is bluetooth device hacking framework☆22Updated last year
- Fast exploitation based on metasploit.☆73Updated 5 years ago
- E-mails, subdomains and names Harvester - OSINT☆14Updated 7 years ago
- USB Rubber Ducky Script, Dransomware is ransomware which will encrypt data without root privileges.☆17Updated 3 years ago
- Twitter Eye is a Twitter Information Gathering Tool With Twitter Eye, you can search with various keywords and usernames on Twitter. Then…☆43Updated 2 months ago
- Best social media phishing☆23Updated 4 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆67Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆52Updated 7 years ago
- an osint automation tool written in Batchfile for lookups including person, phone number, email, license plate, and VIN. this tool only w…☆62Updated 4 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 2 years ago