Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

https://github.com/shodansploit/shodansploit

🔎 shodansploit > v1.3.0
https://github.com/shodansploit/shodansploit

intelligence python-script python-shodan security security-automation security-research security-scanner security-testing security-tools shodan shodan-api shodan-cli shodan-client shodan-python shodan-scripts shodan-tool shodan-tools shodansploit

Last synced: about 1 month ago
JSON representation

🔎 shodansploit > v1.3.0

Lists

README

        

### shodansploit




Shodan is a search engine on the internet where you can find interesting things all over the world. For example, we can find cameras, bitcoin streams, zombie computers, ports with weakness in service, SCADA systems, and more. Moreover, more specific searches are possible. As a result of the search, Shodan shows us the number of vulnerable hosts on Earth.

#### So what does shodansploit do ?

With Shodan Exploit, you will have all your calls on your terminal. It also allows you to make detailed searches.

All you have to do without running Shodansploiti is to add shodan api.

#### Note :

The quality of the search will change according to the api privileges you have used.

#### Screenshot :

#### Shodan API Documention :

* [REST API Documentation](https://developer.shodan.io/api)

* [Exploits REST API Documentation](https://developer.shodan.io/api/exploits/rest)

##### Shodan API Specification :

* [Banner Specification](https://developer.shodan.io/api/banner-specification)

The banner is the main type of information that Shodan provides through the REST and Streaming API. This document outlines the various properties that are always present and which ones are optional.

* [Exploit Specification](https://developer.shodan.io/api/exploit-specification)

The exploit type contains the normalized data from a variety of vulnerability data sources. The Exploits REST API returns this type for its search results. This document outlines the various properties that are always present and which ones are optional.

#### Programming Languages :

* Python

#### System :

* Linux
* Windows

#### RUN

```
root@ismailtasdelen:~# git clone https://github.com/ismailtasdelen/shodansploit.git
root@ismailtasdelen:~# cd shodansploit
root@ismailtasdelen:~/shodansploit# python shodansploit.py
```

#### Docker Build
```
$ docker run -t ismailtasdelen/shodansploit
```

#### Docker Run
```
$ docker run --rm -it ismailtasdelen/shodansploit
```

#### What's on the tool menu ?

```
[1] GET > /shodan/host/{ip}
[2] GET > /shodan/host/count
[3] GET > /shodan/host/search
[4] GET > /shodan/host/search/tokens
[5] GET > /shodan/ports

[6] GET > /shodan/exploit/author
[7] GET > /shodan/exploit/cve
[8] GET > /shodan/exploit/msb
[9] GET > /shodan/exploit/bugtraq-id
[10] GET > /shodan/exploit/osvdb
[11] GET > /shodan/exploit/title
[12] GET > /shodan/exploit/description
[13] GET > /shodan/exploit/date
[14] GET > /shodan/exploit/code
[15] GET > /shodan/exploit/platform
[16] GET > /shodan/exploit/port

[17] GET > /dns/resolve
[18] GET > /dns/reverse
[19] GET > /labs/honeyscore/{ip}

[20] GET > /account/profile
[21] GET > /tools/myip
[22] GET > /tools/httpheaders
[23] GET > /api-info

[24] Exit
```

#### Cloning an Existing Repository ( Clone with HTTPS )

```
root@ismailtasdelen:~# git clone https://github.com/ismailtasdelen/shodansploit.git
```

#### Cloning an Existing Repository ( Clone with SSH )

```
root@ismailtasdelen:~# git clone https://github.com/ismailtasdelen/ismailtasdelen.git
```

#### Contact :

```
Mail : [email protected]
Linkedin : https://www.linkedin.com/in/ismailtasdelen/
GitHub : https://github.com/ismailtasdelen/
Telegram : https://t.me/ismailtasdelen/
```

##### Donate!

Support the authors:

##### Paypal:

https://paypal.me/ismailtsdln

##### LiberaPay:

Donate using Liberapay