Metadata harvester
☆1,227Mar 21, 2024Updated last year
Alternatives and similar repositories for metagoofil
Users that are interested in metagoofil are comparing it to the libraries listed below
Sorting:
- E-mails, subdomains and names Harvester - OSINT☆15,729Feb 22, 2026Updated 2 weeks ago
- Search Google and download specific file types☆539Aug 30, 2025Updated 6 months ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,413Nov 1, 2024Updated last year
- Tool to find metadata and hidden information in the documents.☆3,448Dec 8, 2022Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,229Nov 20, 2025Updated 3 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,832Dec 15, 2024Updated last year
- Web application fuzzer☆6,434Jan 21, 2026Updated last month
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,840Jun 15, 2020Updated 5 years ago
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,767Aug 28, 2024Updated last year
- Attack Surface Management Platform☆9,435Feb 15, 2026Updated 3 weeks ago
- DNS Enumeration Script☆2,956Updated this week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,655Jan 5, 2026Updated 2 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,821Jan 19, 2020Updated 6 years ago
- A swiss army knife for pentesting networks☆9,086Dec 6, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,017Jan 26, 2021Updated 5 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,292Jul 10, 2024Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Sep 1, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,900Aug 17, 2020Updated 5 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,901Jan 24, 2024Updated 2 years ago
- Information gathering tool - OSINT☆1,385Jun 11, 2021Updated 4 years ago
- OSINT python webscaping framework☆1,130Dec 8, 2022Updated 3 years ago
- OSINT Tool for Finding Passwords of Compromised Email Addresses☆2,511Sep 30, 2023Updated 2 years ago
- A Tool for Domain Flyovers☆5,904May 22, 2022Updated 3 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,863May 20, 2025Updated 9 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,958Feb 20, 2026Updated 2 weeks ago
- Next generation web scanner☆6,434Oct 19, 2025Updated 4 months ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆298Dec 4, 2022Updated 3 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,909Aug 15, 2023Updated 2 years ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Fast subdomains enumeration tool for penetration testers☆10,841Aug 2, 2024Updated last year
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,606Apr 15, 2025Updated 10 months ago
- ☆3,839Mar 14, 2024Updated last year
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.