From 55c40443969eb99593fc9a5320703bd41d9afa80 Mon Sep 17 00:00:00 2001 From: Abu Date: Mon, 2 Dec 2024 22:55:23 +0400 Subject: [PATCH] Create exposor.md --- osint/exposor.md | 43 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 43 insertions(+) create mode 100644 osint/exposor.md diff --git a/osint/exposor.md b/osint/exposor.md new file mode 100644 index 0000000..675b42e --- /dev/null +++ b/osint/exposor.md @@ -0,0 +1,43 @@ +# Exposor + + +### Description +Exposor is a contactless reconnaissance tool focused on technology detection across Censys, Fofa, Shodan, and Zoomeye. With a unified syntax for multi-platform querying, It gives security researchers and professionals a clear view of exposed systems, enabling quick risk identification. + +### How it Works + +- Configure your API keys for supported feeds. +- Use exposor's query syntax to find technologies +- Retrive and analyze results accross multiple search engines in a single workflow. +- Contribute custom YAML files to extend detection capabilities. + + +### Key Features + - Easily configure API credentials and keep the intelligence files updated. + - Perform targeted searches by netblock, country code, or hostname. + - Execute queries across multiple feeds with a unified syntax. + - Extend intel capabilities by contributing new YAML files. + - Identify exposed systems and potential vulnerabilities using CPEs or CVEs. + +### Categories +* Vulnerability Scanning +* Vulnerability assessment +* Security Testing +* Penetration Testing +* Intelligence + +### Black Hat sessions +Static Badge + + +### Code +https://github.com/abuyv/exposor + +### Lead Developer(s) + Abdulla Abdullayev - https://github.com/abuyv + +### Social Media +* [Twitter](https://twitter.com/abuyv) +* [Linkedin](https://www.linkedin.com/in/abuyv) +---- +