Metabigor Versions Save

OSINT tools and more but without API key

v2.0.0

2 months ago
  • Reverting to the previous library since ASNMap from https://github.com/projectdiscovery/asnmap now demands an API Key.
  • Added another query for crt.sh in case the organization query is empty
  • Rewrite the code to eliminate the usage of the unsafe library.

v1.2.7

5 months ago

Changelog

  • be443a0 Fix panic issue due to asnmap library error
  • 5955a58 Fix panic issue due to asnmap library error

v1.2.6

7 months ago

Changelog

  • 85ddff6 Replacing the unsafe library
  • c2ad74c Update [email protected]:j3ssie/metabigor.git

v1.2.5

7 months ago

Replacing the unsafe library

v1.2.4

1 year ago

Small fix on the input of metabigor ipc command

v1.2.3

1 year ago
  • Switching to native library embed to embedding the static file.
  • Change the overview scan to rustscan.
  • Refactor some functions.
# Only run rustscan with full ports
echo '1.2.3.4/24' | metabigor scan -o result.txt

# Run rustscan with full ports and nmap detail scan based on pre-scan data
echo '1.2.3.4/24' | metabigor scan --pipe | metabigor scan -R 

v1.12.1

1 year ago
  • Fix the issue when no input is detected in the scan command.
  • Refactor some messages.

v1.12

1 year ago
  • Add a new command metabigor related to dind more related domains of the target by applying various techniques (certificate, whois, Google Analytics, etc).
  • Add a new command metabigor ip to extract Shodan IPInfo from internetdb.shodan.io
  • Refactor and fix some bugs.

Note some of the results are not 100% accurate. Please do a manual check first before put it directly to other tools to scan.

Some specific technique require different input so please see the usage of each technique.

# Getting more related domains by searching for certificate info
echo 'Target Inc' | metabigor cert --json | jq -r '.Domain' | unfurl format %r.%t | sort -u # this is old command

# Getting more related domains by searching for certificate info
echo 'example Inc' | metabigor related -s 'cert'

echo 'example.com' | metabigor related -s 'whois'
# Get it directly from the URL
echo 'https://example.com' | metabigor related -s 'google-analytic'

# You can also search it directly from the UA ID too
metabigor related -s 'google-analytic' -i 'UA-9152XXX' --debug

Extract Shodan IPInfo from internetdb.shodan.io

echo '1.2.3.4' | metabigor ip -open
1.2.3.4:80
1.2.3.4:443

# lookup CIDR range
echo '1.2.3.4/24' | metabigor ip -open -c 20
1.2.3.4:80
1.2.3.5:80

# get raw JSON response
echo '1.2.3.4' | metabigor ip -json

v1.10

2 years ago
  • Refactor and fix some bugs.
  • Add option to run Nmap concurrently from Rustscan result.

echo '1.2.3.4 -> [80,443,2222]' | metabigor scan -R

metabigor-rustscan

v1.9

2 years ago

Refactor and fix some bugs.