BrowserOSINT

This script allows to enumerate and extract data from HACKERTARGET,CRT.SH, SHODAN,IPCRIMINAL, ABUSEIPDB, CENSYS, ZOOMEYE from the enumeration phase of subdomains, services and possible CVE vulnerabilities,compromised emails, everything is used passively.

Add API:

https://api.criminalip.io/v1/ip/data?ip=
"x-api-key": ""
https://api.abuseipdb.com/api/v2/check
"Key": ""
https://search.censys.io/api/v2/certificates/search?q=names=
censys_api_key = ""
api_url = f'https://api.zoomeye.hk/domain/search?q={domain}&type=1&page=1'
api_key = ''

Example

python3 BrowserOSINT.py --target www.target.com --Key xYtuQsB1IPNd3iEV7bSjVmHKUjPqPXpY

posdata: Use you Key Shodan.

poc.mp4