Search an organization name on Shodan, returning vulnerabilities and exploits.
https://developer.shodan.io/api/requirements
git clone https://github.com/byinarie/ShodanTool.git
pip3 install -r requirements.txt
or
pip3 install click && pip3 install termcolor && pip3 install shodan
See: https://gitlab.com/exploit-database/exploitdb
python3 ShodanTool.py --api-key KEY --orgname "ORG" --output ORG.csv --search
python3 ShodanTool.py --api-key KEY --orgname "ORG" --output ORG.csv
python3 ShodanTool.py --api-check --api-key
Usage: ShodanTool.py [OPTIONS]
Options:
-on, --orgname TEXT The name of the organization.
-op, --output TEXT Name of the output file.
-ak, --api-key TEXT Shodan API key. [required]
-s, --search Search for exploits using searchsploit.
--api-check Check Shodan API limits.
--help Show this message and exit.