Instagram Linkedin Twitter Youtube
Search
  • Cyber security
  • Pentesting Tools
  • Vulnerability Analysis
  • Information Gathering
  • Web Application Security
  • Forensics
  • Malware
  • OSINT
Instagram Linkedin Twitter Youtube
Kali Linux Tutorials Kali Linux Tutorials
Kali Linux Tutorials Kali Linux Tutorials
Home Kali Linux Goca : Scanner Used To Find Metadata & Hidden Information
  • Kali Linux

Goca : Scanner Used To Find Metadata & Hidden Information

By
R K
-
March 11, 2019

Goca is a FOCA fork written in Go, which is a tool used mainly to find metadata and hidden information in the documents its scans. These documents may be on web pages, and can be downloaded and analyzed with the scanner.

It is capable of analyzing a wide variety of documents, with the most common being Microsoft Office, Open Office, or PDF files, although it also analyzes Adobe InDesign or SVG files, for instance.

These documents are searched for using search engines such as:

  • Google
  • Bing
  • DuckDuckGo
  • Yahoo
  • Ask

Then downloads the documents and extracts the EXIF information from graphic files, and a complete analysis of the information discovered through the URL is conducted even before downloading the file.

Also Read : Cuteit – IP Obfuscator Made to Make a Malicious IP a Bit Cuter

USAGE

Download built packages from Releases

To build from source, you will need Go installed.

$ export GO111MODULE=on
$ go get ./…
$ go run goca/goca.go -h

To run it from Docker:

$ docker build -t gocaio/goca /path/to/goca
$ docker run gocaio/goca -h

Download

Related

  • TAGS
  • Goca
  • Hidden Information
  • Metadata
Facebook
Twitter
Pinterest
WhatsApp
    Previous articleTurbinia : Automation and Scaling of Digital Forensics Tools
    Next articleCatnip : Automated Basic Pentest Tool – Designed For Kali Linux
    R K
    R K

    RELATED ARTICLESMORE FROM AUTHOR

    Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell
    Kali Linux

    Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

    CVE-Search
    Kali Linux

    CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

    ROADTools : The Azure AD Exploration Framework
    Kali Linux

    ROADTools: The Modern Azure AD Exploration Framework

    cp command

    cp Command: Copy Files and Directories in Linux

    0xSnow - September 20, 2025 0
    The cp command, short for "copy," is the main Linux utility for duplicating files and directories. Whether making a backup, organizing a project, or moving content, cp allows...
    image osint

    Image OSINT

    0xSnow - September 20, 2025 0
    Introduction In digital investigations, images often hold more information than meets the eye. With the right tools and techniques, analysts can uncover hidden metadata, find...
    cat Command

    cat Command: Read and Combine File Contents in Linux

    0xSnow - September 20, 2025 0
    The cat command short for concatenate, It is a fast and versatile tool for viewing and merging file contents directly from the Linux terminal. Whether you're...
    ports in networking

    Port In Networking

    Tamilselvan S - September 20, 2025 0
    What is a Port? A port in networking acts like a gateway that directs data to the right program on a device. An IP address...
    ls command

    ls Command: List Directory Contents in Linux

    0xSnow - September 20, 2025 0
    The ls command is fundamental for anyone working with Linux. It’s used to display the files and directories in your current location, helping you stay organized...
    KALI LINUX TUTORIALS
    Contact us: admin@kalilinuxtutorials.com
    Instagram Linkedin Twitter Youtube

    EVEN MORE NEWS

    cp command

    cp Command: Copy Files and Directories in Linux

    September 20, 2025
    image osint

    Image OSINT

    September 20, 2025
    cat Command

    cat Command: Read and Combine File Contents in Linux

    September 20, 2025

    POPULAR CATEGORY

    • Kali Linux2931
    • Cyber security912
    • Hacking Tools300
    • Pentesting Tools197
    • Exploitation Tools144
    • TECH134
    • Vulnerability Analysis116
    • Cyber security
    • Pentesting Tools
    • Vulnerability Analysis
    • Information Gathering
    • Web Application Security
    • Forensics
    • Malware
    • OSINT
    © Kalilinuxtutorials.com 2025
    MORE STORIES

    Judge Jury And Executable : A File System Forensics Analysis Scanner...

    May 17, 2021

    Network Attacker : WiFi Stress Testing Beacon Flooding & De-authentication Attack

    September 24, 2018

    Flashmingo : Automatic Analysis of SWF Files Based On Some Heuristics

    April 21, 2019