Pymeta is a Python3 rewrite of the tool PowerMeta, created by dafthack in PowerShell. It uses specially crafted search queries to identify and download the following file types (pdf, xls, xlsx, doc, docx, ppt, pptx) from a given domain using Google and Bing. Once downloaded, metadata is extracted from these files using Phil Harvey's exiftool. This is a common place for penetration testers to find internal domain names, usernames, software/version numbers, and identify an organization's naming conventions.
Pymeta can also be pointed at a directory to extract metadata from files manually downloaded using the '-dir' command line argument. See the 'Usage', and 'All Options' sections for more information.
During metadata extraction, unique 'Author', 'Creator', and 'Producer' fields will be written to the terminal. However, more verbose output can be accomplished by generating a csv report with the '-csv' command line argument.
Pymeta is written in python3, use the setup.sh script to ensure all required libraries are installed.
In the Linux terminal run:
- git clone https://github.com/m8r0wn/pymeta
- sudo chmod +x pymeta/setup.sh
- sudo ./pymeta/setup.sh
- Search Google and Bing for files within example.com and extract metadata to terminal:
python3 pymeta.py -d example.com
- Search Google only for files within example.com and extract metadata to a csv report:
python3 pymeta.py -d example.com -s google -csv
- Extract metadata from files within the given directory and create csv report:
python3 pymeta.py -dir ../Downloads/ -csv
-h, --help show help message and exit
-d DOMAIN Target domain
-dir FILE_DIR Directory of files to extract Metadata
-s ENGINE Search engine to use: google, bing, all (Default: all)
-m MAX_RESULTS Max results to collect per file type (Default: 50)
-csv write all metadata to CSV (Default: display in terminal)
Command Line Google Information Disclosure Linux Metadata Extraction Pentest Pentest Tool PowerMeta Pymeta Python3