All Projects → fierceoj → ShonyDanza

fierceoj / ShonyDanza

Licence: MIT License
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.

Programming Languages

103659 projects - #7 most used programming language

Projects that are alternatives of or similar to ShonyDanza

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+3898.84%)
Mutual labels:  penetration-testing, pentesting, scanning, information-gathering, reconnaissance
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+2862.79%)
Mutual labels:  penetration-testing, scanning, red-team, information-gathering, reconnaissance
network reconnaissance toolkit
Stars: ✭ 353 (+310.47%)
Mutual labels:  shodan, penetration-testing, information-gathering, reconnaissance
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (+34.88%)
Mutual labels:  penetration-testing, pentesting, information-gathering, reconnaissance
👀 🖥️ Golang rewrite of Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-55.81%)
Mutual labels:  penetration-testing, pentesting, information-gathering, reconnaissance
Command line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-74.42%)
Mutual labels:  shodan, penetration-testing, pentesting, shodan-api
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+3843.02%)
Mutual labels:  penetration-testing, scanning, information-gathering, reconnaissance
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-1.16%)
Mutual labels:  penetration-testing, pentesting, red-team
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (+3.49%)
Mutual labels:  penetration-testing, pentesting, information-gathering
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (+19.77%)
Mutual labels:  penetration-testing, pentesting, vulnerability-detection
Advanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+2580.23%)
Mutual labels:  penetration-testing, vulnerability-detection, vulnerability-identification
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+124.42%)
Mutual labels:  penetration-testing, pentesting, red-team
thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TV's, Fridges, Webcams, Traffic Lights etc).
Stars: ✭ 30 (-65.12%)
Mutual labels:  shodan, shodan-api, shodan-python
🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+1352.33%)
Mutual labels:  penetration-testing, pentesting, red-team
A small Php application to fetch archive url snapshots from using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made Specially for penetration testing purpose.
Stars: ✭ 66 (-23.26%)
Mutual labels:  penetration-testing, pentesting, reconnaissance
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+12052.33%)
Mutual labels:  penetration-testing, exploits, vulnerability-identification
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+801.16%)
Mutual labels:  penetration-testing, vulnerability-detection, reconnaissance
Awesome Shodan Queries
🔍 A collection of interesting, funny, and depressing search queries to plug into 👩‍💻
Stars: ✭ 2,758 (+3106.98%)
Mutual labels:  shodan, penetration-testing, pentesting
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+451.16%)
Mutual labels:  penetration-testing, exploits, pentesting
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+712.79%)
Mutual labels:  penetration-testing, information-gathering, reconnaissance


A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.

Demo GIF

With ShonyDanza, you can:

  • Obtain IPs based on search criteria
  • Automatically exclude honeypots from the results based on your pre-configured thresholds
  • Pre-configure all IP searches to filter on your specified net range(s)
  • Pre-configure search limits
  • Use build-a-search to craft searches with easy building blocks
  • Use stock searches and pre-configure your own stock searches
  • Check if IPs are known malware C2s
  • Get host and domain profiles
  • Scan on-demand
  • Find exploits
  • Get total counts for searches and exploits
  • Automatically save exploit code, IP lists, host profiles, domain profiles, and scan results to directories within ShonyDanza


git clone


  • python3
  • shodan library

cd ShonyDanza
pip3 install -r requirements.txt


Edit to include your desired configurations
cd configs
sudo nano

#config file for shonydanza searches

#maximum number of results that will be returned per search
#default is 100


#IPs exceeding the honeyscore limit will not show up in IP results
#scale is 0.0 to 1.0
#adjust to desired probability to restrict results by threshold, or keep at 1.0 to include all results


#REQUIRED - at least one key: value pair
#add a shodan dork to the dictionary below to add it to your shonydanza stock searches menu
#see for a great source of queries
#check into "vuln:" filter if you have Small Business Plan or higher (e.g., vuln:cve-2019-11510)

'ANONYMOUS_FTP':'ftp anonymous ok',
'RDP':'port:3389 has_screenshot:true',
'OPEN_TELNET':'port:23 console gateway -password',
'APACHE_DIR_LIST':'http.title:"Index of /"',
'HP_PRINTERS':'"Serial Number:" "Built:" "Server: HP HTTP"',
'DOCKER_API':'"Docker Containers:" port:2375',
'ANDROID_ROOT_BRIDGE':'"Android Debug Bridge" "Device" port:5555',
'MONGO_EXPRESS_GUI':'"Set-Cookie: mongo-express=" "200 OK"',
'CVE-2019-19781_CITRIX_NETSCALER':'http.waf:"Citrix NetScaler"',
'CVE-2020-5902_F5_BIGIP':'http.favicon.hash:-335242539 "3992"',
'CVE-2020-3452_CISCO_ASA_FTD':'200 "Set-Cookie: webvpn;"'

#IP or cidr range constraint for searches that return list of IP addresses
#use comma-separated list to designate multiple (e.g.,,, 


cd ../

See this how-to article for additional usage instruction.

Legal Disclaimer

This project is made for educational and ethical testing purposes only. Usage of ShonyDanza for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected]