Last active
October 20, 2019 09:01
-
-
Save 0xdade/93fd6bfd5de54d6d0299a3fc36684af6 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Based on https://twitter.com/stokfredrik/status/1185580290108018694 | |
# Turns into a bash function to ease use further | |
# Relies on: | |
# - https://github.com/tomnomnom/unfurl | |
# - https://github.com/michenriksen/aquatone | |
# - https://cli.shodan.io/ | |
# Put this function in your .bash_profile or .bashrc file and then source it and you can use it like so: | |
# $ prowl elasticsearch | |
function prowl { | |
for domain in $(curl https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/master/data/domains.txt | unfurl -u format '%r');do shodan search --fields ip_str,port "$@" "ssl:$domain" | awk '{print $1}' | aquatone -out data/$domain;done | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment