Pymeta is a Python3 rewrite of the tool PowerMeta, created by dafthack in PowerShell. It uses specially crafted search queries to identify and download the following file types (pdf, xls, xlsx, doc, docx, ppt, pptx) from a given domain using Google and Bing. Once downloaded, metadata is extracted from these files using Phil Harvey’s exiftool. This is a common place for penetration testers to find internal domain names, usernames, software/version numbers, and identify an organization’s naming conventions.
Pymeta can also be pointed at a directory to extract metadata from files manually downloaded using the ‘-dir’ command line argument. See the ‘Usage’, and ‘All Options’ sections for more information.
During metadata extraction, unique ‘Author’, ‘Creator’, and ‘Producer’ fields will be written to the terminal. However, more verbose output can be accomplished by generating a csv report with the ‘-csv’ command line argument.
Pymeta is written in python3, use the script to ensure all required libraries are installed.

Getting Started
In the Linux terminal run:

  1. git clone
  2. sudo chmod +x pymeta/
  3. sudo ./pymeta/


  • Search Google and Bing for files within and extract metadata to terminal:
    python3 -d
  • Search Google only for files within and extract metadata to a csv report:
    python3 -d -s google -csv
  • Extract metadata from files within the given directory and create csv report:
    python3 -dir ../Downloads/ -csv

All Options

-h, --help      show help message and exit
-d DOMAIN Target domain
-dir FILE_DIR Directory of files to extract Metadata
-s ENGINE Search engine to use: google, bing, all (Default: all)
-m MAX_RESULTS Max results to collect per file type (Default: 50)
-csv write all metadata to CSV (Default: display in terminal)