“Exif Looter” is a powerful tool designed for the extraction and management of metadata from images.

This guide provides a step-by-step approach to installing and utilizing Exif Looter, from analyzing individual images to processing entire directories.

Whether you’re a cybersecurity professional or a digital forensics enthusiast, this article will equip you with the skills to effectively manage and remove metadata from your digital media.

Table Of Contents

  1. Getting Started
    • Installation
  2. Usage
    • Analyze specific image
    • Analyze specific directory
    • Pipe with other tools
    • Remove metadata from Images
    • Get Open Street Map URL
  3. Reports
  4. Roadmap
  5. Contributing
  6. License
  7. Contact

Getting Started

General information about setting up Exif Looter locally


go install github.com/aydinnyunus/exifLooter@latest

ExifLooter depends on exiftool, so make sure it is on your PATH.

On Kali Linux

sudo apt install exiflooter


Analyze Image

After you have install requirements , you can simply analyze the image via:

   $ exifLooter --image image.jpeg

Analyze Directory

If you want to specify directory use this command:

   $ exifLooter -d images/


If you want to pipe with other tools use this command:

   $ cat urls | exifLooter -p
   $ cat urls | exifLooter --pipe
   $ cat subdomains | waybackurls | grep "jpeg\|png\|jiff\|jpg" >> urls; cat urls | exifLooter --pipe

Remove Metadata

Remove Metadata from Images

   $ exifLooter --remove --image image.jpeg
   $ exifLooter --remove --directory images/

For more information click here.

Published by Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Leave a comment

Your email address will not be published. Required fields are marked *