Pyfoca

Description

If you’re familiar with the Windows FOCA application, this is basically a python version of it. Pyfoca will use Google to discover files with extensions such as .pdf, .xls, .doc, etc. and download them. Once downloaded, it will extract all metadata which, in many cases, include usernames you can use for password attacks.

Usage

Syntax

pyfoca.py <OPTIONS>

Options

 Domain options:

    -d <domain>      Harvests all documents from a domain (saves to pyfoca-downloads/).
                     Afterwards, extract metadata.

 Parse file/dir:

    -f <file>     Extracts metadata specifically from one file. (Cannot use with '-d')
    -w <dir>      Extracts metadata from files within specified directory. (Cannot use with '-d')

 Foca Export Parsing:

    -r <directory>      Parses data exported from FOCA. Provide directory containing exported files.

 Misc:

    -x                     After parsing metadata, delete files downloaded from the domain.
    -e <pdf|doc|xls|all>   Search based on provided extension(s). Separate with comma. (Default is all.)
    -p <number>            Searches x amount of google pages (per extension). (Default is 2.)
    -t <secs>              Sets timeout value. (Default is 5.)
    -v                     Prints status messages for files that are downloaded.

 Supported extensions are: .pdf, .doc, .docx, .xls, .xlsx, and .ppt

Example

cyborg@cyborg:~$ pyfoca -d www.ztrela.com -e pdf -p 20
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?