Blue Eye a python Recon Toolkit / Shodan, Headers Subdomain resolves to IP addresses, company email
Hacking Passion Jolanda de koff Bulls Eye
Blue Eye is a python Recon Toolkit script. It shows Shodan info, ports, and headers. Subdomain resolves to the IP addresses, company email addresses and much more ..!
To run Blue Eye, all it takes is a domain and company name when prompted.
Shodan For additional data gathering, you can enter a Shodan API key when prompted. Blue Eye will show the company's data, the open ports. It also shows you the Headers, on which you can determine whether they are vulnerable. A Shodan API key can be found here: https://account.shodan.io/register
Furthermore, it shows the:
- Mail Servers.
- DNS Text Records.
- Nameserver Records.
- Sites of interest. "email, okta, webmail and slack"
- List of GitHub user pages.
- List of possible company email addresses harvested from GitHub user pages and from DuckDuckGo and Linkedin searches.
- Subdomain resolves to the IP addresses.
I made this script in python 2.7. (Later I can - I will change this to python 3) But for now, I think python 2 is nicer, more beautiful and better. "It's kind of personal" :-)
Install Blue Eye on Linux:
git clone https://github.com/BullsEye0/blue_eye.git cd blue_eye pip install -r requirements.txt
Use: python blue_eye.py
(You will be asked for a Shodan API key. But this is not necessarily)
Contact to coder Social Networks - Connect
Contact to coder Social Networks - Connect
Facebook: https://www.facebook.com/jolandadekoff
linkedin: https://www.linkedin.com/in/jolandadekoff
Youtube: https://youtu.be/XCtWM-4ov2U
Facebook Page: https://www.facebook.com/ethical.hack.group
Facebook Group: https://www.facebook.com/groups/ethicalhacking.hacker ... https://www.youtube.com/watch?v=gWhK_iryM64
31414438 Bytes