Blue Eye is a python Recon Toolkit script. It shows Shodan info, ports and headers. Subdomain resolves to the IP addresses, company email addresses and much more ..!
To run Blue Eye, all it takes is a domain and company name when prompted.
For additional data gathering, you can enter a Shodan API key when prompted. Blue Eye will show the company's data, the open ports. It also shows you the Headers, on which you can determine whether they are vulnerable.
A Shodan API key can be found here: https://account.shodan.io/register
- Mail Servers.
- DNS Text Records.
- Nameserver Records.
- Sites of interest. "email, okta, webmail and slack"
- List of GitHub user pages.
- List of possible company email addresses harvested from GitHub user pages and from DuckDuckGo and Linkedin searches.
- Subdomain resolves to the IP addresses.
I made this script in python 2.7 (Later I can - I will change this to python 3) But for now I think python 2 is nicer, more beautiful and better. "It's kind of personal" 😃
git clone https://github.com/BullsEye0/blue_eye.git
cd blue_eye
pip install -r requirements.txt
python blue_eye.py
(You will be asked for a Shodan API key. But this is not necessarily)
Have fun ..! 😃
Social Networks - Connect
Facebook: https://www.facebook.com/jolandadekoff
linkedin: https://www.linkedin.com/in/jolandadekoff
Youtube: https://youtu.be/XCtWM-4ov2U
Facebook Page: https://www.facebook.com/ethical.hack.group
Facebook Group: https://www.facebook.com/groups/Ethical.Hacking.Cyber.Secure/
Facebook Group: https://www.facebook.com/groups/ethicalhacking.hacker
LiberaPay