Cyber security

Exif Looter – A Comprehensive Guide To Managing Image Metadata

“Exif Looter” is a powerful tool designed for the extraction and management of metadata from images.

This guide provides a step-by-step approach to installing and utilizing Exif Looter, from analyzing individual images to processing entire directories.

Whether you’re a cybersecurity professional or a digital forensics enthusiast, this article will equip you with the skills to effectively manage and remove metadata from your digital media.

Table Of Contents

  1. Getting Started
    • Installation
  2. Usage
    • Analyze specific image
    • Analyze specific directory
    • Pipe with other tools
    • Remove metadata from Images
    • Get Open Street Map URL
  3. Reports
  4. Roadmap
  5. Contributing
  6. License
  7. Contact

Getting Started

General information about setting up Exif Looter locally

Installation

go install github.com/aydinnyunus/exifLooter@latest

ExifLooter depends on exiftool, so make sure it is on your PATH.

On Kali Linux

sudo apt install exiflooter

Usage

Analyze Image

After you have install requirements , you can simply analyze the image via:

   $ exifLooter --image image.jpeg

Analyze Directory

If you want to specify directory use this command:

   $ exifLooter -d images/

Pipe

If you want to pipe with other tools use this command:

   $ cat urls | exifLooter -p
   $ cat urls | exifLooter --pipe
   $ cat subdomains | waybackurls | grep "jpeg\|png\|jiff\|jpg" >> urls; cat urls | exifLooter --pipe

Remove Metadata

Remove Metadata from Images

   $ exifLooter --remove --image image.jpeg
   $ exifLooter --remove --directory images/

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Useful Bug Bounty And Security Related Write-ups : A Comprehensive Guide For Enthusiasts

This repo contains all variants of information security & Bug bounty & Penetration Testing write-up…

1 hour ago

Admin-Panel-Dorks : Mastering Google Dorks To Uncover Hidden Admin Panels

site:*/sign-in site:*/account/login site:*/forum/ucp.php?mode=login inurl:memberlist.php?mode=viewprofile intitle:"EdgeOS" intext:"Please login" inurl:user_login.php intitle:"Web Management Login" site:*/users/login_form site:*/access/unauthenticated site:account.*.*/login site:admin.*.com/signin/…

1 hour ago

Conduwuit : Pioneering A New Era In Matrix Homeservers

Matrix is an open network for secure and decentralized communication. Users from every Matrix homeserver…

1 hour ago

LSMS – Linux Security And Monitoring Scripts

Linux Security And Monitoring Scripts are a collection of security and monitoring scripts you can…

1 hour ago

Fiber – Using Fibers To Run In-Memory Code

A fiber is a unit of execution that must be manually scheduled by the application…

1 hour ago

XSS-Exploitation-Tool : A Penetration Testing Tool

XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site…

1 hour ago