Shodanploit – Shodan Command Line Interface Written In Python

0
23
Shodanploit - Shodan Command Line Interface Written In Python

Shodan is a search engine on the web the place you could find attention-grabbing issues everywhere in the world. For instance, we are able to discover cameras, bitcoin streams, zombie computer systems, ports with weak point in service, SCADA techniques, and extra. Moreover, extra particular searches are attainable. As a results of the search, Shodan exhibits us the variety of vulnerable hosts on Earth.

So what does shodansploit do ?

With Shodan Exploit, you’ll have all of your calls in your terminal. It additionally lets you make detailed searches.

All it’s a must to do with out working Shodansploiti is so as to add shodan api.

Note :

The high quality of the search will change in keeping with the api privileges you may have used.

Shodan API Documention :

Shodan API Specification :
The banner is the principle sort of data that Shodan offers via the REST and Streaming API. This doc outlines the varied properties which can be at all times current and which of them are optionally available.
The exploit sort incorporates the normalized information from quite a lot of
vulnerability information sources. The Exploits REST API returns this sort for its search outcomes. This doc outlines the varied properties which can be at all times current and which of them are optionally available.

Programming Languages :

System :

RUN

[email protected]:~# git clone https://github.com/ismailtasdelen/shodansploit.git
[email protected]:~# cd shodansploit
[email protected]:~/shodansploit# python shodansploit.py

What’s on the instrument menu ?

[1] GET > /shodan/host/{ip} 
[2] GET > /shodan/host/depend
[3] GET > /shodan/host/search 
[4] GET > /shodan/host/search/tokens 
[5] GET > /shodan/ports 

[6] GET > /shodan/exploit/creator
[7] GET > /shodan/exploit/cve
[8] GET > /shodan/exploit/msb
[9] GET > /shodan/exploit/bugtraq-id
[10] GET > /shodan/exploit/osvdb
[11] GET > /shodan/exploit/title
[12] GET > /shodan/exploit/description
[13] GET > /shodan/exploit/date
[14] GET > /shodan/exploit/code
[15] GET > /shodan/exploit/platform
[16] GET > /shodan/exploit/port

[17] GET > /dns/resolve
[18] GET > /dns/reverse 
[19] GET > /labs/honeyscore/{ip}

[20] GET > /account/profile 
[21] GET > /instruments/myip 
[22] GET > /instruments/httpheaders
[23] GET > /api-data 

[24] Exit

Cloning an Existing Repository ( Clone with HTTPS )

[email protected]:~# git clone https://github.com/ismailtasdelen/shodansploit.git

Cloning an Existing Repository ( Clone with SSH )

[email protected]:~# git clone https://github.com/ismailtasdelen/ismailtasdelen.git

Contact :

Mail : [email protected]
Linkedin : https://www.linkedin.com/in/ismailtasdelen/
GitHub : https://github.com/ismailtasdelen/
Telegram : https://t.me/ismailtasdelen/

MoreTip.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.