This script allows to enumerate and extract data from HACKERTARGET,CRT.SH, SHODAN,IPCRIMINAL, ABUSEIPDB, CENSYS, ZOOMEYE from the enumeration phase of subdomains, services and possible CVE vulnerabilities,compromised emails, everything is used passively.
https://api.criminalip.io/v1/ip/data?ip=
"x-api-key": ""
https://api.abuseipdb.com/api/v2/check
"Key": ""
https://search.censys.io/api/v2/certificates/search?q=names=
censys_api_key = ""
api_url = f'https://api.zoomeye.hk/domain/search?q={domain}&type=1&page=1'
api_key = ''
python3 BrowserOSINT.py --target www.target.com --Key xYtuQsB1IPNd3iEV7bSjVmHKUjPqPXpY
posdata: Use you Key Shodan.