15-02-25, 02:05 PM
shef is a simple tool for extracting data from Shodan searches without requiring an API key.
![[Image: hwzSOzP]](https://imgur.com/a/hwzSOzP)
![[Image: hwzSOzP]](https://imgur.com/a/hwzSOzP)
Usage:
Example Commnad
Source:
https://github.com/1hehaq/shef
- Extract IP addresses, domain names, and known vulnerabilities with ease
- Supports multiple facets including IP, domain, port, vulnerability, and HTTP components
- Utilizes random User-Agent rotation to mimic diverse browsing behavior
- Produces clean, pipe-friendly output suitable for further processing
- Requires minimal dependencies (only bash and curl)
Quote:git clone https://github.com/1hehaq/shef.git && cd shef && chmod +x shef.sh && sudo mv shef.sh /bin/shef && cd .. && rm -rf shef
Usage:
Code:
-q : Search query (required)
-f : Facet type (default: ip)
-l : Limit results (default: 100)
-h : Show help messageExample Commnad
Code:
# Retrieve IP addresses associated with Apache servers
shef -q "apache" > apache_ips.txt
# Discover subdomains related to a specific organization
shef -q 'org:"Google LLC"' -f domain
# Identify open ports for a particular product
shef -q "product:nginx" -f port
# Extract web technologies in use
shef -q "wordpress" -f http.component
# Find known vulnerabilities for a product
shef -q "product:jboss" -f vulnSource:
https://github.com/1hehaq/shef
