Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nemmusu/passive-company-scanner
The Passive Company Scanner is a passive vulnerability scanning tool. By entering a company's name, it identifies associated IP addresses and gathers information on open ports, vulnerabilities, and more. It uses non-invasive techniques to map the attack surface without directly interacting with the targets.
https://github.com/nemmusu/passive-company-scanner
command-line-tool passive-scanner penetration-testing penetration-testing-tools python red-teaming red-teaming-tools ripe shodan
Last synced: 3 days ago
JSON representation
The Passive Company Scanner is a passive vulnerability scanning tool. By entering a company's name, it identifies associated IP addresses and gathers information on open ports, vulnerabilities, and more. It uses non-invasive techniques to map the attack surface without directly interacting with the targets.
- Host: GitHub
- URL: https://github.com/nemmusu/passive-company-scanner
- Owner: nemmusu
- Created: 2024-05-19T17:16:53.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-05-19T18:24:41.000Z (8 months ago)
- Last Synced: 2024-11-16T13:09:17.910Z (2 months ago)
- Topics: command-line-tool, passive-scanner, penetration-testing, penetration-testing-tools, python, red-teaming, red-teaming-tools, ripe, shodan
- Language: Python
- Homepage:
- Size: 16.6 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Passive Company Scanner
## Overview
The Passive Company Scanner, by inputting a python regex containing the company name (for example: \bcompany), utilizes data from the RIPE db to identify involved networks and leverages the Shodan API to retrieve detailed information about the identified IP addresses, thereby conducting a passive perimeter search, discovering open ports, and identifying potential vulnerabilities in the organization's infrastructure.
It uses non-invasive techniques to map the attack surface without directly interacting with the targets.## Requirements
- Python 3.x
- Shodan API
- Python Modules: `shodan`, `tqdm`
- To install dependencies, run: `pip3 install -r requirements.txt`## Installation
1. Clone or download the repository.
2. Make sure you have all the above requirements installed.
3. Modify the `api.conf` file with your Shodan API key.
4. Run the script using the command `python3 pcs.py` followed by desired options.## Usage
- `--update`: Update files in the `ripe_db` directory.
- `-v`, `--verbose`: Enable verbose mode.
- `-r`, `--regex`: Target Python Regex (example: `-r "\bcompany"`).
- `-c`, `--csv`: Write results to a CSV file.
- `-j`, `--json`: Write results to a JSON file.
- `-o`, `--output`: Base name for output files (log, csv, json).
- `-s`, `--scan`: Prints or logs only essential scan information: IP, port, version and product, operating system, CPE, and vulnerabilities (CSV and JSON files remain complete).## Example
bash
```bash
python3 pcs.py -r "\bcompany" -v -j -s -c -o output_filename
```