Metabigor : Command Line Search Engines Without Any API Key

Metabigor allows you do query from command line to awesome Search Engines (like Shodan, Censys, Fofa, etc) without any API key.

But Why ?

  • Don’t use your API key so you don’t have to worry about litmit of API quotation.
  • Do query from command line without Premium account.
  • Get more result without Premium account.
  • But I have an Premium account why do I need this shit?
    • Again it will not lose your API quotation.
    • Your query will optimized so you gonna get more result than using it by hand or API key.
    • Never get duplicate result.

Also Read – PhoneSploit : Using Open ADB Ports We Can Exploit A Android Device

How it works?

It gonna use your cookie or not to simulate search from browser and optimize the query to get more result.

Search Engine currently supported

  • Shodan.
  • Censys.
  • Fofa Pro.

Installation

git clone https://github.com/j3ssie/Metabigor
cd Metabigor
pip3 install -r requirements.txt

Demo

How to use

Basic Usage

./metabigor.py -s -q ‘‘ [options]

Check out the Advanced Usage to explore some awesome options

Example commands

Note: Fill your credentials or your sessions on config.conf if you want to get more results.

./metabigor.py -s fofa -q ‘title=”Dashboard – Confluence” && body=”.org”‘

./metabigor.py -s fofa -q ‘title=”Dashboard – Confluence” && body=”.org”‘ -b –disable_pages

./metabigor.py -s shodan -q ‘port:”3389″ os:”Windows”‘ –debug

Options

[*] Setup session

Do command below or direct modify config.conf file
./metabigor.py -s shodan –cookies=
./metabigor.py -s censys –cookies=
./metabigor.py -s fofa –cookies=

[*] Basic Usage
./metabigor.py -s -q ” [options]

[*] More Options
-d OUTDIR, –outdir OUTDIR
Directory output
-o OUTPUT, –output OUTPUT
Output file name
–raw RAW Directory to store raw query
–proxy PROXY Proxy for doing request to search engine e.g:
http://127.0.0.1:8080
-b Auto brute force the country code
–disable_pages Don’t loop though the pages
–store_content Store the raw HTML souce or not
–hh Print this message
–debug Print debug output

[*] Example commands
./metabigor.py -s fofa -q ‘title=”Dashboard – Confluence” && body=”.org”‘ -b
./metabigor.py -s fofa -q ‘title=”Dashboard – Confluence” && body=”.org”‘ -b –disable_pages
./metabigor.py -s shodan -q ‘port:”3389″ os:”Windows”‘ –debug
./metabigor.py -s shodan -Q list_of_query.txt –debug -o rdp.txt
./metabigor.py -s censys -q ‘(scada) AND protocols: “502/modbus”‘ -o something –debug –proxy socks4://127.0.0.1:9050

Disclaimer

This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.

Credit: Vitaly Gorbachev and Picascii

R K

Recent Posts

PwnedPasswordsDownloader – Efficient Downloading Of HIBP Password Hashes Using Curl Parallelism

Thanks for HIBP and this downloader. At first I was considering using it, but the…

3 days ago

Cybersecurity Conferences – A Comprehensive Slide Collection

Comprehensive repository for presentation slides from major cybersecurity conferences held in 2023 and 2024. It…

1 week ago

DLL Proxy Generator – Harnessing Advanced Proxy Capabilities

Generate a proxy dll for arbitrary dll, while also loading a user-defined secondary dll. In…

1 week ago

DLL Universal Patcher – A Comprehensive Guide To Advanced Binary Patching

DLL Universal Patcher is a flexible and convenient code patcher that doesn't touch the files…

1 week ago

RustiveDump : A Rust-Based Tool For Efficient Memory Dumping Of lsass.exe

RustiveDump is a Rust-based tool designed to dump the memory of the lsass.exe process using…

1 week ago

SharpExclusionFinder – Streamlining Windows Defender Exclusion Checks With Advanced Scanning Capabilities

This C# program finds Windows Defender folder exclusions using Windows Defender through its command-line tool…

1 week ago