pymeta: search the web for files on a domain


Pymeta is a Python3 rewrite of the tool PowerMeta, created by dafthack in PowerShell. It uses specially crafted search queries to identify and download the following file types (pdf, xls, xlsx, doc, docx, ppt, pptx) from a given domain using Google and Bing. Once downloaded, metadata is extracted from these files using Phil Harvey’s exiftool. This is a common place for penetration testers to find internal domain names, usernames, software/version numbers, and identify an organization’s naming conventions.

Pymeta can also be pointed at a directory to extract metadata from files manually downloaded using the ‘-dir’ command line argument.

During metadata extraction, unique ‘Author’, ‘Creator’, and ‘Producer’ fields will be written to the terminal. However, the more verbose output can be accomplished by generating a csv report with the ‘-csv’ command line argument.


  1. git clone
  2. sudo chmod +x pymeta/
  3. sudo ./pymeta/


-h, –help show help message and exit
-d DOMAIN Target domain
-dir FILE_DIR Directory of files to extract Metadata
-s ENGINE Search engine to use: google, bing, all (Default: all)
-m MAX_RESULTS Max results to collect per file type (Default: 50)
-csv write all metadata to CSV (Default: display in terminal)

  • Search Google and Bing for files within and extract metadata to terminal:
    python3 -d
  • Search Google only for files within and extract metadata to a csv report:
    python3 -d -s google -csv
  • Extract metadata from files within the given directory and create csv report:
    python3 -dir ../Downloads/ -csv

Copyright (C) 2018 Mike Brown





Read more…

Anastasis Vasileiadis

PC Technical || Penetration Tester || Ethical Hacker || Cyber Security Expert || Cyber Security Analyst || Information Security Researcher || Malware analyst || Malware Investigator || Reverse Engineering

Leave a Reply

SC ProDefence SRL - Cyber Security Services