OSINT tools and more but without API key
Replacing the unsafe library
Small fix on the input of metabigor ipc
command
# Only run rustscan with full ports
echo '1.2.3.4/24' | metabigor scan -o result.txt
# Run rustscan with full ports and nmap detail scan based on pre-scan data
echo '1.2.3.4/24' | metabigor scan --pipe | metabigor scan -R
metabigor related
to dind more related domains of the target by applying various techniques (certificate, whois, Google Analytics, etc).metabigor ip
to extract Shodan IPInfo from internetdb.shodan.iometabigor related
Note some of the results are not 100% accurate. Please do a manual check first before put it directly to other tools to scan.
Some specific technique require different input so please see the usage of each technique.
# Getting more related domains by searching for certificate info
echo 'Target Inc' | metabigor cert --json | jq -r '.Domain' | unfurl format %r.%t | sort -u # this is old command
# Getting more related domains by searching for certificate info
echo 'example Inc' | metabigor related -s 'cert'
echo 'example.com' | metabigor related -s 'whois'
# Get it directly from the URL
echo 'https://example.com' | metabigor related -s 'google-analytic'
# You can also search it directly from the UA ID too
metabigor related -s 'google-analytic' -i 'UA-9152XXX' --debug
echo '1.2.3.4' | metabigor ip -open
1.2.3.4:80
1.2.3.4:443
# lookup CIDR range
echo '1.2.3.4/24' | metabigor ip -open -c 20
1.2.3.4:80
1.2.3.5:80
# get raw JSON response
echo '1.2.3.4' | metabigor ip -json
echo '1.2.3.4 -> [80,443,2222]' | metabigor scan -R
Refactor and fix some bugs.