Skip to content

Latest commit

 

History

History
35 lines (25 loc) · 846 Bytes

README.md

File metadata and controls

35 lines (25 loc) · 846 Bytes

BrowserOSINT

This script allows to enumerate and extract data from HACKERTARGET,CRT.SH, SHODAN,IPCRIMINAL, ABUSEIPDB, CENSYS, ZOOMEYE from the enumeration phase of subdomains, services and possible CVE vulnerabilities,compromised emails, everything is used passively.

Add API:

https://api.criminalip.io/v1/ip/data?ip=
"x-api-key": ""
https://api.abuseipdb.com/api/v2/check
"Key": ""
https://search.censys.io/api/v2/certificates/search?q=names=
censys_api_key = ""
api_url = f'https://api.zoomeye.hk/domain/search?q={domain}&type=1&page=1'
api_key = ''

Example

python3 BrowserOSINT.py --target www.target.com --Key xYtuQsB1IPNd3iEV7bSjVmHKUjPqPXpY

posdata: Use you Key Shodan.

poc.mp4