Penetration Testing Tools, ML and Linux Tutorials
  • Data Science
    • Artificial Intelligence
    • Data Analyst
    • Deep Learning
    • Machine Learning
  • Kali
    • Exploits
    • OSINT
    • Tools
    • Bug Bounty
    • Resources
  • Linux
    • DevOps
    • Docker
    • Kubernetes
    • Git
  • Forensics
    • Cyber Forensics
    • Digital Forensics
    • Linux Forensics
    • Network Forensics
    • Threat Analyst
    • Incident Response
  • SQL
  • CVE
  • Share
  • News
  • Services
    • CrackMyHash
  • Small Business
  • Resources
  • White Papers
  • Crypto News
  • Programming
    • Python
    • NodeJS
    • Java
    • Javascript
    • PHP
    • Agile
    • TypeScript
  • Android
  • SEO
  • Microsoft
    • Azure
    • Dot Net
    • Powershell
  • Networking
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
  • Data Science
    • Artificial Intelligence
    • Data Analyst
    • Deep Learning
    • Machine Learning
    Data Science Command Line
    Machine Learning on Geographical Data
    Data Science Squad Roadmap
    Defence Artificial Intelligence Strategy
    Previous Next
  • Kali
    • Exploits
    • OSINT
    • Tools
    • Bug Bounty
    • Resources
    Tools and Techniques for Red Team
    Process Injection Enumeration Tool
    SSH based reverse shell
    XRAY GUI Starter Web Vulnerability Scanner
    Previous Next
  • Linux
    • DevOps
    • Docker
    • Kubernetes
    • Git
    DevOps Learning resources
    Linux Ultimate Guide
    DevOps Roadmap 2022
    Collection of tips on Linux
    Previous Next
  • Forensics
    • Cyber Forensics
    • Digital Forensics
    • Linux Forensics
    • Network Forensics
    • Threat Analyst
    • Incident Response
    Awesome Forensics
    Awesome Event IDs
    Digital Forensics Guide
    Digital Forensics and Incident Response SOC
    Previous Next
  • SQL
    SQL Cheat Sheet
    The Rust SQL Toolkit
    Postgres to Elasticsearch sync
    Awesome SQL Server
    Universal Command Line interface for SQL databases
    Previous Next
  • CVE
  • Share
  • News
  • Services
    • CrackMyHash
Penetration Testing Tools, ML and Linux Tutorials Penetration Testing Tools, ML and Linux Tutorials
  • Data Science
    • Artificial Intelligence
    • Data Analyst
    • Deep Learning
    • Machine Learning
    Data Science Command Line
    Machine Learning on Geographical Data
    Data Science Squad Roadmap
    Defence Artificial Intelligence Strategy
    Previous Next
  • Kali
    • Exploits
    • OSINT
    • Tools
    • Bug Bounty
    • Resources
    Tools and Techniques for Red Team
    Process Injection Enumeration Tool
    SSH based reverse shell
    XRAY GUI Starter Web Vulnerability Scanner
    Previous Next
  • Linux
    • DevOps
    • Docker
    • Kubernetes
    • Git
    DevOps Learning resources
    Linux Ultimate Guide
    DevOps Roadmap 2022
    Collection of tips on Linux
    Previous Next
  • Forensics
    • Cyber Forensics
    • Digital Forensics
    • Linux Forensics
    • Network Forensics
    • Threat Analyst
    • Incident Response
    Awesome Forensics
    Awesome Event IDs
    Digital Forensics Guide
    Digital Forensics and Incident Response SOC
    Previous Next
  • SQL
    SQL Cheat Sheet
    The Rust SQL Toolkit
    Postgres to Elasticsearch sync
    Awesome SQL Server
    Universal Command Line interface for SQL databases
    Previous Next
  • CVE
  • Share
  • News
  • Services
    • CrackMyHash
Kali

Goblyn – tool for Enumeration and capture of website files metadata

Stella Sebastian
Posted by Stella Sebastian September 9, 2021

superior_hosting_service

gob

Goblyn is a Python tool focused to enumeration and capture of website files metadata.


Metadata Enumeration

Metadata

What’s Goblyn?

Goblyn is a tool focused to enumeration and capture of website files metadata.

How it works?

Goblyn will search for active directories in the website and so enumerate the files, if it find some file it will get the metadata of file.

Why Goblyn?

  • Supports multiple file types;
  • Simple to use;
  • Easy installation;
  • Fast.

Installing Goblyn

  1. Download this repository and run:
sudo python3 setup.py install
  1. Download the exiftool:
sudo apt install exiftool
  1. Have fun 🙂
sudo goblyn [OPTIONS]

How to use Goblyn?

You can use the -help argument to explore help banner of Goblyn.

Example of use:

sudo goblyn -t http://fma.if.usp.br/~amsilva/Livros/ -wl C:\Users\Lsy\Desktop\common.txt --file-types=pdf,docx,png

Call for Contributions

If you finds this tool useful and wants to add some functionality, improve the code performance or improve something in the Goblyn, the best way to get it added is to submit a pull request.


Github Link
100 Red Team Projects for Pentesters and Network Managers
Tags: Enumeration Goblyn Metadata
0 Shares
Share on Facebook Share on Twitter Share on Pinterest Share on Email
Stella Sebastian September 9, 2021
Previous Article 100 Red Team Projects for Pentesters and Network Managers
Next Article Khepri – Cross platform agent and Post exploitation tool

Leave a Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Posts

Tools and Techniques for Red Team

December 26, 2022

Process Injection Enumeration Tool

December 20, 2022

SSH based reverse shell

December 18, 2022

XRAY GUI Starter Web Vulnerability Scanner

December 16, 2022
HostnExtra Ads
Neevahost ad post

You Might Also Enjoy

Resources

Tools and Techniques for Red Team

December 26, 2022
Tools

Process Injection Enumeration Tool

December 20, 2022
Tools

SSH based reverse shell

December 18, 2022
Tools

XRAY GUI Starter Web Vulnerability Scanner

December 16, 2022
Load More
  • ABOUT
  • ADVERTISEMENT
  • TEAM
  • JOBS
  • CONTACT
  • PRIVACY POLICY
  • DISCLOSURE

© 2021 Reconshell All Rights Reserved.