Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/opcod3r/godan
Shodan tool subdomains with rotation keys.. 🎩
https://github.com/opcod3r/godan
bugbounty bugbounty-tool golang pentest recon security shodan subdomains
Last synced: 29 days ago
JSON representation
Shodan tool subdomains with rotation keys.. 🎩
- Host: GitHub
- URL: https://github.com/opcod3r/godan
- Owner: opcod3r
- License: apache-2.0
- Created: 2024-08-04T19:16:26.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-09-16T22:28:57.000Z (5 months ago)
- Last Synced: 2024-09-18T10:12:05.821Z (5 months ago)
- Topics: bugbounty, bugbounty-tool, golang, pentest, recon, security, shodan, subdomains
- Language: Go
- Homepage:
- Size: 79.1 KB
- Stars: 1
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
### Godan ( Golang + Shodan )
This is a command-line tool that finds subdomains for a given domain using the Shodan API. It supports multiple API keys and handles rate limiting by pausing between requests. The tool also provides detailed output and logging options.
## Features
- Finds subdomains for a given domain using Shodan API
- Supports multiple Shodan API keys
- Handles rate limiting by pausing between requests
- Saves found subdomains to a file
- Provides detailed output and logging with a verbose option
- Loads domains from an input file
- Displays API usage information## Installation
To use this tool, you need to have [Go](https://golang.org/) installed. Clone the repository and build the project:
```sh
git clone https://github.com/opcod3r/godan.git
cd godan
go mod init github.com/opcod3r/godan
go build -o godan
```## Usage
```sh
./godan -d [-f ] [-k ] [-o ] [-v]
```### Options
- `-d `: The target domain to find subdomains for.
- `-f `: A file containing a list of domains to find subdomains for (one per line).
- `-k `: A file containing Shodan API keys (one per line). Defaults to `keys.txt`.
- `-o `: Save the found subdomains to a file.
- `-v`: Enable verbose output for detailed logging.### Examples
#### Finding Subdomains for a Single Domain
```sh
./godan -d example.com -k keys.txt
```#### Finding Subdomains for Multiple Domains from a File
```sh
./godan -f domains.txt -k keys.txt
```#### Saving Subdomains to a File
```sh
./godan -d example.com -k keys.txt -o subdomains.txt
```#### Enabling Verbose Output
```sh
./godan -d example.com -k keys.txt -v
```## Detailed Example
Here is a detailed example of how to use this tool with all the features enabled:
1. Create a file named `keys.txt` and add your Shodan API keys (one per line):
```
key1
key2
key3
```2. Create a file named `domains.txt` and add the domains you want to search for (one per line):
```
example.com
anotherdomain.com
```3. Run the tool:
```sh
./godan -f domains.txt -k keys.txt -o subdomains.txt -v
```This command will:
- Read the domains from `domains.txt`
- Use the API keys from `keys.txt`
- Save the found subdomains to `subdomains.txt`
- Enable verbose output for detailed logging![](image.png)
## License
This project is licensed under the MIT License. See the [LICENSE](LICENSE) file for more details.