Skip to content

Latest commit

 

History

History
executable file
·
47 lines (34 loc) · 1.34 KB

README.md

File metadata and controls

executable file
·
47 lines (34 loc) · 1.34 KB

ISPLOIT

Description

Information exploit of Target domain. It's a api gethering information and records of webserver. It provide some exploits suggesstions with open port information and scrapping some useful information from the hosted sites. deployed at https://isploit.herokuapp.com/{target-domain}/{shodanapikey}

note: To collect server and site information take some time between 1-2 mins, I will improve performance of this API.

REQUIREMENTS

root# pip3 install -r requirements.txt

RUN

root# python3 app.py
* Serving Flask app "app" (lazy loading)
* Environment: production
WARNING: This is a development server. Do not use it in a production deployment.
Use a production WSGI server instead.
* Debug mode: on
* Running on http://127.0.0.1:5001/ (Press CTRL+C to quit)

USE

LOCAL URL - http://127.0.0.1:5000/{target-url}/{(Shodan api-key) or (none)}

GLOBAL URL - https://isploit.herokuapp.com/{target-url}/{shodan api-key}

For Shodan API-KEY login this link shodan.io

GET method - URL in browser POST method - Return json data requests.post('URL')

SCREEN SHOTS

Server information URL information Shodan information