tool for extracting data from Shodan searches without requiring an API key
by dark_code - 15-02-25, 02:05 PM
#1
shef is a simple tool for extracting data from Shodan searches without requiring an API key.
  • Extract IP addresses, domain names, and known vulnerabilities with ease
  • Supports multiple facets including IP, domain, port, vulnerability, and HTTP components
  • Utilizes random User-Agent rotation to mimic diverse browsing behavior
  • Produces clean, pipe-friendly output suitable for further processing
  • Requires minimal dependencies (only bash and curl)
Installation
Quote:git clone https://github.com/1hehaq/shef.git && cd shef && chmod +x shef.sh && sudo mv shef.sh /bin/shef && cd .. && rm -rf shef

[Image: hwzSOzP][Image: hwzSOzP]

Usage:
 
Code:
-q : Search query (required)
-f : Facet type (default: ip)
-l : Limit results (default: 100)
-h : Show help message


Example Commnad
 
Code:
# Retrieve IP addresses associated with Apache servers
shef -q "apache" > apache_ips.txt

# Discover subdomains related to a specific organization
shef -q 'org:"Google LLC"' -f domain

# Identify open ports for a particular product
shef -q "product:nginx" -f port

# Extract web technologies in use
shef -q "wordpress" -f http.component

# Find known vulnerabilities for a product
shef -q "product:jboss" -f vuln


Source:
https://github.com/1hehaq/shef
Reply
#2
thanks
Reply
#3
thank you so much!
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)