The Passive Company Scanner, by inputting a python regex containing the company name (for example: \bcompany), utilizes data from the RIPE db to identify involved networks and leverages the Shodan API to retrieve detailed information about the identified IP addresses, thereby conducting a passive perimeter search, discovering open ports, and identifying potential vulnerabilities in the organization's infrastructure. It uses non-invasive techniques to map the attack surface without directly interacting with the targets.
- Python 3.x
- Shodan API
- Python Modules:
shodan
,tqdm
- To install dependencies, run:
pip3 install -r requirements.txt
- Clone or download the repository.
- Make sure you have all the above requirements installed.
- Modify the
api.conf
file with your Shodan API key. - Run the script using the command
python3 pcs.py
followed by desired options.
--update
: Update files in theripe_db
directory.-v
,--verbose
: Enable verbose mode.-r
,--regex
: Target Python Regex (example:-r "\bcompany"
).-c
,--csv
: Write results to a CSV file.-j
,--json
: Write results to a JSON file.-o
,--output
: Base name for output files (log, csv, json).-s
,--scan
: Prints or logs only essential scan information: IP, port, version and product, operating system, CPE, and vulnerabilities (CSV and JSON files remain complete).
bash
python3 pcs.py -r "\bcompany" -v -j -s -c -o output_filename