Shodanploit - Shodan Ascendancy Trouble Interface Written Inwards Python


Shodan is a search engine on the cyberspace where y'all tin discovery interesting things all over the world. For example, nosotros tin discovery cameras, bitcoin streams, zombie computers, ports alongside weakness inwards service, SCADA systems, as well as more. Moreover, to a greater extent than specific searches are possible. As a number of the search, Shodan shows us the number of vulnerable hosts on Earth.

So what does shodansploit produce ?
With Shodan Exploit, y'all volition bring all your calls on your terminal. It also allows y'all to brand detailed searches.
All y'all bring to produce without running Shodansploiti is to add together shodan api.

Note :
The character of the search volition alter according to the api privileges y'all bring used.


Shodan API Documention :

Shodan API Specification :
The banner is the principal type of information that Shodan provides through the REST as well as Streaming API. This document outlines the diverse properties that are e'er introduce as well as which ones are optional.
The exploit type contains the normalized information from a multifariousness of vulnerability information sources. The Exploits REST API returns this type for its search results. This document outlines the diverse properties that are e'er introduce as well as which ones are optional.

Programming Languages :
  • Python

System :
  • Linux
  • Windows

RUN
root@ismailtasdelen: # git clone https://github.com/ismailtasdelen/shodansploit.git root@ismailtasdelen: # cd shodansploit root@ismailtasdelen: /shodansploit# python shodansploit.py

What's on the tool carte du jour ?
[1] GET > /shodan/host/{ip}  [2] GET > /shodan/host/count [3] GET > /shodan/host/search  [4] GET > /shodan/host/search/tokens  [5] GET > /shodan/ports   [6] GET > /shodan/exploit/author [7] GET > /shodan/exploit/cve [8] GET > /shodan/exploit/msb [9] GET > /shodan/exploit/bugtraq-id [10] GET > /shodan/exploit/osvdb [11] GET > /shodan/exploit/title [12] GET > /shodan/exploit/description [13] GET > /shodan/exploit/date [14] GET > /shodan/exploit/code [15] GET > /shodan/exploit/platform [16] GET > /shodan/exploit/port  [17] GET > /dns/resolve [18] GET > /dns/reverse  [19] GET > /labs/honeyscore/{ip}  [20] GET > /account/profile  [21] GET > /tools/myip  [22] GET > /tools/httpheaders [23] GET > /api-info   [24] Exit

Cloning an Existing Repository ( Clone alongside HTTPS )
root@ismailtasdelen: # git clone https://github.com/ismailtasdelen/shodansploit.git

Cloning an Existing Repository ( Clone alongside SSH )
root@ismailtasdelen: # git clone https://github.com/ismailtasdelen/ismailtasdelen.git

Contact :
Mail : ismailtasdelen@protonmail.com Linkedin : https://www.linkedin.com/in/ismailtasdelen/ GitHub : https://github.com/ismailtasdelen/ Telegram : https://t.me/ismailtasdelen/