“Exif Looter” is a powerful tool designed for the extraction and management of metadata from images.

This guide provides a step-by-step approach to installing and utilizing Exif Looter, from analyzing individual images to processing entire directories.

Whether you’re a cybersecurity professional or a digital forensics enthusiast, this article will equip you with the skills to effectively manage and remove metadata from your digital media.

Table Of Contents

  1. Getting Started
    • Installation
  2. Usage
    • Analyze specific image
    • Analyze specific directory
    • Pipe with other tools
    • Remove metadata from Images
    • Get Open Street Map URL
  3. Reports
  4. Roadmap
  5. Contributing
  6. License
  7. Contact

Getting Started

General information about setting up Exif Looter locally

Installation

go install github.com/aydinnyunus/exifLooter@latest

ExifLooter depends on exiftool, so make sure it is on your PATH.

On Kali Linux

sudo apt install exiflooter

Usage

Analyze Image

After you have install requirements , you can simply analyze the image via:

   $ exifLooter --image image.jpeg

Analyze Directory

If you want to specify directory use this command:

   $ exifLooter -d images/

Pipe

If you want to pipe with other tools use this command:

   $ cat urls | exifLooter -p
   $ cat urls | exifLooter --pipe
   $ cat subdomains | waybackurls | grep "jpeg\|png\|jiff\|jpg" >> urls; cat urls | exifLooter --pipe

Remove Metadata

Remove Metadata from Images

   $ exifLooter --remove --image image.jpeg
   $ exifLooter --remove --directory images/

For more information click here.

LEAVE A REPLY

Please enter your comment!
Please enter your name here