Tool to list vulnerabilities that may be exploitable without access to the target (with shodan)
- Get version information and vulnerability list from Shodan and Censys
- Search for exploit in Exploit-DB and Vulners
If you want to use censys, rename .env.sample to .env and fill in your credentials.
usage: recon-sploit.py [-h] (-l DOMAIN_LIST | -d DOMAIN | --cpe CPE | --cve CVE) [--show-duplicate SHOW_DUPLICATE]
Run recon-sploit.py with arguments
optional arguments:
-h, --help show this help message and exit
-l DOMAIN_LIST, --domain-list DOMAIN_LIST
specify target domain list file
-d DOMAIN, --domain DOMAIN
specify single domain or IP
--cpe CPE specify single CPE
--cve CVE specify single CVE
--show-duplicate SHOW_DUPLICATE
show duplicate exploits
python3 recon-sploit.py -d example.com
assetfinder example.com | sort | uniq > domains.txt
and
python3 recon-sploit.py -l domains.txt