Metabigor : Intelligence Tool But Without API Key

Metabigor is Intelligence tool, its goal is to do OSINT tasks and more but without any API key.

Installation

go get -u github.com/j3ssie/metabigor

Main Features

  • Discover IP Address of the target.
  • Wrapper for running masscan and nmap on IP target.
  • Do searching from command line on some search engine.

Demo

Also Read – Gospider : Fast Web Spider Written In Go

Example Commands

#discovery IP of a company/organization
echo “company” | metabigor net –org -o /tmp/result.txt
#discovery IP of an ASN
echo “ASN1111” | metabigor net –asn -o /tmp/result.txt
cat list_of_ASNs | metabigor net –asn -o /tmp/result.txt
#running masscan on port 443 for a subnet
echo “1.2.3.4/24” | metabigor scan -p 443 -o /tmp/result.txt
#running masscan on all port and nmap on open port
cat list_of_IPs | metabigor scan –detail -o /tmp/result.txt
#search result on fofa
echo ‘title=”RabbitMQ Management”‘ | metabigor search -x -v -o /tmp/result.txt

Disclaimer

This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.

Credit: flaticon by freepik

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 week ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

3 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

3 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

3 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

3 weeks ago