Metabigor is a powerful OSINT and threat intelligence tool that performs extensive information gathering and scanning without requiring any API keys.
OSINT tools and more but without API key
Metabigor is designed for security researchers, penetration testers, and threat intelligence analysts to discover detailed information about IPs, ASNs, organizations, and related domains using various OSINT techniques. It also efficiently wraps network scanning tools like rustscan, masscan, and nmap to streamline vulnerability and network monitoring tasks without relying on third-party API keys.
Metabigor requires installation of external tools like rustscan, masscan, and nmap for full scanning capabilities. Some OSINT results, especially related domains, may not be 100% accurate and should be manually verified before use in further analysis or scanning. No API keys are needed, which simplifies setup and usage but may limit access to some data sources.
Download pre-built binaries from the releases page for your platform
Place the binary in your system PATH
Alternatively, build from source using: go install github.com/j3ssie/metabigor@2.0.0
echo "company" | metabigor net --org -o /tmp/result.txt
Discover IP addresses associated with a company or organization (static database results).
echo "ASN1111" | metabigor net --asn -o /tmp/result.txt
Discover IP addresses associated with a specific ASN (static database results).
echo "ASN1111" | metabigor netd --asn -o /tmp/result.txt
Discover IP addresses associated with a specific ASN using dynamic third-party sources.
echo 'example Inc' | metabigor related -s 'cert'
Find related domains by searching certificate information on crt.sh.
echo 'example.com' | metabigor related -s 'whois'
Find related domains using Reverse Whois lookup.
echo '1.2.3.4/24' | metabigor scan -o result.txt
Run rustscan on the specified IP range with full ports.
echo '1.2.3.4:21' | metabigor scan -s
Run detailed nmap scan based on pre-scan data for specified IP and port.
cat list_of_ip_with_port.txt | metabigor scan -c 10 --8 -s -o result.txt
Run concurrent nmap scans with specified concurrency and options on a list of IPs with ports.
echo '1.2.3.4/24' | metabigor scan --pipe | metabigor scan -R
Run rustscan with full ports and then run nmap detailed scan based on rustscan pre-scan results.