Skip to content

Latest commit

 

History

History
38 lines (27 loc) · 1.56 KB

README.md

File metadata and controls

38 lines (27 loc) · 1.56 KB

Passive Company Scanner

Overview

The Passive Company Scanner, by inputting a python regex containing the company name (for example: \bcompany), utilizes data from the RIPE db to identify involved networks and leverages the Shodan API to retrieve detailed information about the identified IP addresses, thereby conducting a passive perimeter search, discovering open ports, and identifying potential vulnerabilities in the organization's infrastructure. It uses non-invasive techniques to map the attack surface without directly interacting with the targets.

Requirements

  • Python 3.x
  • Shodan API
  • Python Modules: shodan, tqdm
  • To install dependencies, run: pip3 install -r requirements.txt

Installation

  1. Clone or download the repository.
  2. Make sure you have all the above requirements installed.
  3. Modify the api.conf file with your Shodan API key.
  4. Run the script using the command python3 pcs.py followed by desired options.

Usage

  • --update: Update files in the ripe_db directory.
  • -v, --verbose: Enable verbose mode.
  • -r, --regex: Target Python Regex (example: -r "\bcompany").
  • -c, --csv: Write results to a CSV file.
  • -j, --json: Write results to a JSON file.
  • -o, --output: Base name for output files (log, csv, json).
  • -s, --scan: Prints or logs only essential scan information: IP, port, version and product, operating system, CPE, and vulnerabilities (CSV and JSON files remain complete).

Example

bash

python3 pcs.py -r "\bcompany" -v -j -s -c -o output_filename