From MRL Wiki
SEAT (Search Engine Assessment Tool) is the next generation information digging application geared toward the needs of security professionals. SEAT uses information stored in search engine databases, cache repositories, and other public resources to scan a site for potential vulnerabilities. It’s multi-threaded, multi-database, and multi-search-engine capabilities permit easy navigation through vast amounts of information with a goal of system security assessment. Furthermore, SEAT’s ability to easily process additional search engine signatures as well as custom made vulnerability databases allows security professionals to adapt SEAT to their specific needs.
- Mine domain names belonging to a target site
- Indirectly scan a range of IP addresses
- Quickly create new custom Search Engine signatures and Vulnerability Databases.
 Requested Features
Feel free to add feature requests. Leave your name so I can credit you with the idea.
Alternative Sources of Information:
archive.org cached sites (pull dates of significant changes, for manual review) skout
 CVS Access
CVS is available here:
:ext:email@example.com:/cvsroot co seat
This is on port 222 (in a chroot on the main system), so the easiest thing to do is to add midnightresearch.com into your ssh config:
$ cat ~/.ssh/config Host midnightresearch.com Port 222 $export CVS_RSH=ssh
Please contact sith if you want an account