General information about setting up Exif Looter locally
go install github.com/aydinnyunus/[email protected]
Exif Looter depends on exiftool, so make sure it is on your PATH.
After you have install requirements , you can simply analyze the image via:
$ exifLooter --image image.jpeg
If you want to specify directory use this command:
$ exifLooter -d images/
If you want to pipe with other tools use this command:
$ cat urls | exifLooter -p $ cat urls | exifLooter --pipe $ cat subdomains | waybackurls | grep "jpeg\|png\|jiff\|jpg" >> urls; cat urls | exifLooter --pipe
Bugcrowd’s Vulnerability Rating Taxonomy
Example Hackerone Report : https://hackerone.com/reports/906907 200$
Example BugCrowd Report : https://medium.com/@souravnewatia/exif-geolocation-data-not-stripped-from-uploaded-images-794d20d2fa7d 500$
See the open issues for a list of proposed features (and known issues).
Contributions are what make the open source community such an amazing place to be learned, inspire, and create. Any contributions you make are greatly appreciated.
- Fork the Project
- Create your Feature Branch (
git checkout -b feature/AmazingFeature)
- Commit your Changes (
git commit -m 'Add some AmazingFeature')
- Push to the Branch (
git push origin feature/AmazingFeature)
- Open a Pull Request
Distributed under the Apache License 2.0 License. See
LICENSE for more information.