Pular para o conteúdo principal

Whatsapp 47 988618255

Compartilhe

ferramentas para extrair metadados de PDFs e imagens.

Hoje eu vou mostrar as três melhores ferramentas para extrair metadados de PDFs e imagens. Primeiro, o pdfinfo — ótimo para verificar autores, datas de criação e o software utilizado. Depois, o ExifTool — o extrator de metadados mais poderoso, revelando GPS, informações do dispositivo e metadados avançados. E por fim, o Metadata2Go — um analisador online rápido para quando você precisa de resultados imediatos. Use essas ferramentas no seu workflow de OSINT para verificar documentos, rastrear a origem de fotos e descobrir detalhes ocultos.”🎥 Extração de Metadados de PDF e Imagens — Tutorial Completo Neste vídeo, eu compartilho diferentes técnicas e ferramentas que você pode usar para extrair metadados de imagens ou arquivos PDF. Vamos analisar três ferramentas essenciais: Pdfinfo, ExifTool e Metadata2Go. 🔹 1. PDFINFO — Extraindo Metadados de PDFs (Ferramenta Local) O que faz: O pdfinfo lê os metadados estruturais e de autoria armazenados dentro de arquivos PDF. ✅ Como usar (Linux...

HackerTarget ToolKit v2.0 - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery






Use open source tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities. Identification of an organizations vulnerabilities is an impossible task without tactical intelligence on the network footprint. By combining open source intelligence with the worlds best open source security scanning tools, we enable your attack surface discovery. With the ability for Internet assets to be deployed in seconds, the attack surface is more dynamic and ever growing. This very fact makes mapping your external network footprint a hard problem. We aim to provide solutions to solve this problem. Start with our tools for domain and IP address data, then pivot to mapping the exposure with hosted open source scanners. We have developed a linux terminal tool using python programming language through an api which we received from !

faraday

How do you run it?

Clone with HTTPS
git clone https://github.com/ismailtasdelen/hackertarget.git
cd hackertarget/

Run pip3 install to set up this script
pip3 install .

Run hackertarget CLI script via following command
python hackertarget.py

View :
root@ismailtasdelen:~# python hackertarget.py

  _               _              _                          _
 | |_   __ _  __ | |__ ___  _ _ | |_  __ _  _ _  __ _  ___ | |_
 | ' \ / _` |/ _|| / // -_)| '_||  _|/ _` || '_|/ _` |/ -_)|  _|
 |_||_|\__,_|\__||_\_\___||_|   \__|\__,_||_|  \__, |\___| \__|
                                                |___/
           Ismail Tasdelen
 | github.com/ismailtasdelen | linkedin.com/in/ismailtasdelen |


[1] Traceroute
[2] Ping Test
[3] DNS Lookup
[4] Reverse DNS
[5] Find DNS Host
[6] Find Shared DNS
[7] Zone Transfer
[8] Whois Lookup
[9] IP Location Lookup
[10] Reverse IP Lookup
[11] TCP Port Scan
[12] Subnet Lookup
[13] HTTP Header Check
[14] Extract Page Links
[15] Version
[16] Exit

Which option number :

Menu :
  • [1] Traceroute
  • [2] Ping Test
  • [3] DNS Lookup
  • [4] Reverse DNS
  • [5] Find DNS Host
  • [6] Find Shared DNS
  • [7] Zone Transfer
  • [8] Whois Lookup
  • [9] IP Location Lookup
  • [10] Reverse IP Lookup
  • [11] TCP Port Scan
  • [12] Subnet Lookup
  • [13] HTTP Header Check
  • [14] Extract Page Links
  • [15] Version
  • [16] Exit

Cloning an Existing Repository ( Clone with HTTPS )
root@ismailtasdelen:~# git clone https://github.com/ismailtasdelen/hackertarget.git

Cloning an Existing Repository ( Clone with SSH )
root@ismailtasdelen:~# git clone git@github.com:ismailtasdelen/hackertarget.git

Changelog v2.0:

  • To support the python3 version at least, using the print(...) function.
  • Split the hackertarget_api from hackertarget.py file.
  • Added the hackertarget_api test.
  • Added setup file.
  • Added .travis.yml file and integration was achieved.
  • raw_input function is undefined in python-3.x versions. Using the input function instead.
  • Using the mock tests because we don't need to test the external API service. We can assume that external API service is expected successfully.
  • Added the tool version information module.



Reference :


Comentários

Como usar um Agente OSINT IA

Pericia Digital

Ebook

OSINT NEWS NO X

Postagens mais visitadas