If you’re familiar with the Windows FOCA application, this is basically a python version of it. Pyfoca will use Google to discover files with extensions such as .pdf, .xls, .doc, etc. and download them. Once downloaded, it will extract all metadata which, in many cases, include usernames you can use for password attacks.
Domain options: -d <domain> Harvests all documents from a domain (saves to pyfoca-downloads/). Afterwards, extract metadata. Parse file/dir: -f <file> Extracts metadata specifically from one file. (Cannot use with '-d') -w <dir> Extracts metadata from files within specified directory. (Cannot use with '-d') Foca Export Parsing: -r <directory> Parses data exported from FOCA. Provide directory containing exported files. Misc: -x After parsing metadata, delete files downloaded from the domain. -e <pdf|doc|xls|all> Search based on provided extension(s). Separate with comma. (Default is all.) -p <number> Searches x amount of google pages (per extension). (Default is 2.) -t <secs> Sets timeout value. (Default is 5.) -v Prints status messages for files that are downloaded. Supported extensions are: .pdf, .doc, .docx, .xls, .xlsx, and .ppt
cyborg@cyborg:~$ pyfoca -d www.ztrela.com -e pdf -p 20