“Exif Looter” is a powerful tool designed for the extraction and management of metadata from images.
This guide provides a step-by-step approach to installing and utilizing Exif Looter, from analyzing individual images to processing entire directories.
Whether you’re a cybersecurity professional or a digital forensics enthusiast, this article will equip you with the skills to effectively manage and remove metadata from your digital media.
Table Of Contents
- Getting Started
- Installation
- Usage
- Analyze specific image
- Analyze specific directory
- Pipe with other tools
- Remove metadata from Images
- Get Open Street Map URL
- Reports
- Roadmap
- Contributing
- License
- Contact
Getting Started
General information about setting up Exif Looter locally
Installation
go install github.com/aydinnyunus/exifLooter@latest
ExifLooter depends on exiftool, so make sure it is on your PATH.
On Kali Linux
sudo apt install exiflooter
Usage
Analyze Image
After you have install requirements , you can simply analyze the image via:
$ exifLooter --image image.jpeg
Analyze Directory
If you want to specify directory use this command:
$ exifLooter -d images/
Pipe
If you want to pipe with other tools use this command:
$ cat urls | exifLooter -p
$ cat urls | exifLooter --pipe
$ cat subdomains | waybackurls | grep "jpeg\|png\|jiff\|jpg" >> urls; cat urls | exifLooter --pipe
Remove Metadata
Remove Metadata from Images
$ exifLooter --remove --image image.jpeg
$ exifLooter --remove --directory images/
For more information click here.