Breaking News



A customizable, easy-to-navigate device for researching, pen trying out, and protective with the power of Shodan.

With ShonyDanza, you’ll be able to:

  • Obtain IPs consistent with search requirements
  • Routinely exclude honeypots from the results consistent with your pre-configured thresholds
  • Pre-configure all IP searches to filter for your specified web range(s)
  • Pre-configure search limits
  • Use build-a-search to craft searches with blank building blocks
  • Use stock searches and pre-configure your own stock searches
  • Check out if IPs are identified malware C2s
  • Get host and house profiles
  • Scan on-demand
  • To search out exploits
  • Get common counts for searches and exploits
  • Routinely save exploit code, IP lists, host profiles, house profiles, and scan results to directories inside of ShonyDanza

Arrange

git clone https://github.com/fierceoj/ShonyDanza.git

Prerequisites

cd ShonyDanza
pip3 arrange -r must haves.txt

Usage

Edit config.py to include your desired configurations
cd configs
sudo nano config.py

<div class=”snippet-clipboard-content position-relative overflow-auto” data-snippet-clipboard-copy-content=”#config file for shonydanza searches #REQUIRED #maximum selection of results that could be returned in line with search #default is 100 SEARCH_LIMIT = 100 #REQUIRED #IPs exceeding the honeyscore restrict isn’t going to show up in IP results #scale is 0.0 to a minimum of one.0 #adjust to desired probability to restrict results by the use of threshold, or keep at 1.0 to include all results HONEYSCORE_LIMIT = 1.0 #REQUIRED – at least one key: worth pair #add a shodan dork to the

#config file for shonydanza searches

#REQUIRED
#maximum selection of results that could be returned in line with search
#default is 100

SEARCH_LIMIT = 100

#REQUIRED
#IPs exceeding the honeyscore restrict isn't going to show up in IP results
#scale is 0.0 to a minimum of one.0
#adjust to desired probability to restrict results by the use of threshold, or keep at 1.0 to include all results

HONEYSCORE_LIMIT = 1.0

#REQUIRED - at least one key: worth pair
#add a shodan dork to the dictionary below so to upload it for your shonydanza stock searches menu
#see https://github.com/jakejarvis/awesome-shodan-queries for a in point of fact easiest provide of queries
#check out into "vuln:" filter in case you have Small Business Plan or higher (e.g., vuln:cve-2019-11510)

STOCK_SEARCHES = {
'ANONYMOUS_FTP':'ftp anonymous excellent sufficient',
'RDP':'port:3389 has_screenshot:true',
'OPEN_TELNET':'port:23 console gateway -password',
'APACHE_DIR_LIST':'http.identify:"Index of / "',
'SPRING_BOOT':'http.favicon.hash:116323821',
'HP_PRINTERS':'"Serial Amount:" "Built:" "Server: HP HTTP"',
'DOCKER_API':'"Docker Containers:" port:2375',
'ANDROID_ROOT_BRIDGE':'"Android Debug Bridge" "Device" port:5555',
'MONGO_EXPRESS_GUI':'"Set-Cookie: mongo-express=" "200 OK"',
'CVE-2019-11510_PULSE_VPN':'http.html:/dana-na/',
'CVE-2019-19781_CITRIX_NETSCALER':'http.waf:"Citrix NetScaler"',
'CVE-2020-5902_F5_BIGIP':'http.favicon.hash:-335242539 "3992"',
'CVE-2020-3452_CISCO_ASA_FTD':'200 "Set-Cookie: webvpn;"'
}

#OPTIONAL
#IP or cidr range constraint for searches that return checklist of IP addresses
#use comma-separated checklist to designate a few (e.g. 1.1.1.1,2.2.0.0/16,3.3.3.3,3.3.3.4)

#NET_RANGE = '0.0.0.0/0'

This challenge is made for academic and ethical trying out purposes absolute best. Usage of ShonyDanza for attacking goals without prior mutual consent is illegal. It is the end individual’s responsibility to obey all appropriate local, state and federal laws. Developers think no prison duty and aren’t chargeable for any misuse or hurt resulted in by the use of this program.


Leave a Reply

Your email address will not be published.

Donate Us

X