Skip to content

Tool to list vulnerabilities that may be exploitable without access to the target (with shodan)

Notifications You must be signed in to change notification settings

4equest/recon-sploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

recon-sploit

Tool to list vulnerabilities that may be exploitable without access to the target (with shodan)

carbon

Features

  • Get version information and vulnerability list from Shodan and Censys
  • Search for exploit in Exploit-DB and Vulners

Usage

If you want to use censys, rename .env.sample to .env and fill in your credentials.

usage: recon-sploit.py [-h] (-l DOMAIN_LIST | -d DOMAIN | --cpe CPE | --cve CVE) [--show-duplicate SHOW_DUPLICATE]

Run recon-sploit.py with arguments

optional arguments:
  -h, --help            show this help message and exit
  -l DOMAIN_LIST, --domain-list DOMAIN_LIST
                        specify target domain list file
  -d DOMAIN, --domain DOMAIN
                        specify single domain or IP
  --cpe CPE             specify single CPE
  --cve CVE             specify single CVE
  --show-duplicate SHOW_DUPLICATE
                        show duplicate exploits

Example

recon example.com

python3 recon-sploit.py -d example.com 

recon example.com subdomains

assetfinder example.com | sort | uniq > domains.txt  

and

python3 recon-sploit.py -l domains.txt

About

Tool to list vulnerabilities that may be exploitable without access to the target (with shodan)

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages