Search host, range of hosts or exploits in Shodan and save results in a file.
Cloning this repo to your computer typing on your terminal:
git clone https://github.com/Va5c0/Shodan_cmd.git
Type ./shodan_cmd.py -h to see help.
Type ./shodan_cmd.py to see examples.
Use examples:
- Get information about:
- API:
./shodan_cmd.py -I api - Protocols:
./shodan_cmd.py -I protocols - Services:
./shodan_cmd.py -I services - Queries:
./shodan_cmd.py -I queries -p [pag num] --sort [votes/timestamp] --order [desc/asc]
-
Search in queries posted by users.
./shodan_cmd.py -Q [query] -p [pag num] -
Search in Shodan.
./shodan_cmd.py -S [query] -p [pag num] -
Get info about host.
./shodan_cmd.py -H [host] -
Search a range of hosts.
./shodan_cmd.py -R [ip/range] -
Search exploits.
./shodan_cmd.py -E [query]
- Possible search filters:
author bid code cve date platform
type osvdb msb port title description - Example:
./shodan_cmd.py -E 'ftp type:remote platform:linux'
- Show a report with selected field/s.
./shodan_cmd.py -S [query] -r [field/s]
- Possible fields.
product ip_str port hostnames city
longitude latitude country_name os
timestamp transport data isp asn - Example:
./shodan_cmd.py -S 'ftp anonymous user logged in' -r ip_str,city
--- All options support the argument [-o] to save result in a file. ---
Shodan_cmd V1.0