Skip to content
#

censys-api

Here are 9 public repositories matching this topic...

The idea for this project is to create a multi-threaded python server that will generate HTML reports on what exploits can be run against what host. First, the user will create a new session with the host and give the host an IP. Based on whether or not that IP can be scanned passively (if it exists in Shodan/Censys) it will ask the user if this is owned or allowed infrastructure to scan. If the user consents, the server will scan the host with Nmap and determine what versions the host is running and if their services are vulnerable. If the user does not approve the server will not scan the host. If the given host has already been scanned by Censys/Shodan then those results will be fed into the server via API's. The server/script will then determine if the vulnerability has a given exploit, which it will then display to the user along with the ports in a report that is in HTML format.

  • Updated May 8, 2021
  • CSS

Improve this page

Add a description, image, and links to the censys-api topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the censys-api topic, visit your repo's landing page and select "manage topics."

Learn more