Shodan is a search engine on the internet where you can find interesting things all over the world. For example, we can find cameras, bitcoin streams, zombie computers, ports with weakness in service, SCADA systems, and more. Moreover, more specific searches are possible. As a result of the search, Shodan shows us the number of vulnerable hosts on Earth.

So what does shodansploit do ?

With Shodan Exploit, you will have all your calls on your terminal. It also allows you to make detailed searches.

All you have to do without running Shodansploiti is to add shodan api.

Note :

The quality of the search will change according to the api privileges you have used.

Screenshot :

Shodan API Documention :

Shodan API Specification :

The banner is the main type of information that Shodan provides through the REST and Streaming API. This document outlines the various properties that are always present and which ones are optional.

The exploit type contains the normalized data from a variety of vulnerability data sources. The Exploits REST API returns this type for its search results. This document outlines the various properties that are always present and which ones are optional.

Programming Languages :

  • Python

System :

  • Linux
  • Windows


root@ismailtasdelen:~# git clone
root@ismailtasdelen:~# cd shodansploit
root@ismailtasdelen:~/shodansploit# python

Docker Build

$ docker run -t ismailtasdelen/shodansploit

Docker Run

$ docker run --rm -it ismailtasdelen/shodansploit

What’s on the tool menu ?

[1] GET > /shodan/host/{ip} 
[2] GET > /shodan/host/count
[3] GET > /shodan/host/search 
[4] GET > /shodan/host/search/tokens 
[5] GET > /shodan/ports 

[6] GET > /shodan/exploit/author
[7] GET > /shodan/exploit/cve
[8] GET > /shodan/exploit/msb
[9] GET > /shodan/exploit/bugtraq-id
[10] GET > /shodan/exploit/osvdb
[11] GET > /shodan/exploit/title
[12] GET > /shodan/exploit/description
[13] GET > /shodan/exploit/date
[14] GET > /shodan/exploit/code
[15] GET > /shodan/exploit/platform
[16] GET > /shodan/exploit/port

[17] GET > /dns/resolve
[18] GET > /dns/reverse 
[19] GET > /labs/honeyscore/{ip}

[20] GET > /account/profile 
[21] GET > /tools/myip 
[22] GET > /tools/httpheaders
[23] GET > /api-info 

[24] Exit

Cloning an Existing Repository ( Clone with HTTPS )

root@ismailtasdelen:~# git clone

Cloning an Existing Repository ( Clone with SSH )

root@ismailtasdelen:~# git clone

Contact :

Mail : [email protected]
Linkedin :
GitHub :
Telegram :

Subscribe to our channel and do not miss new collections of tools in various areas of Information Security.

  Posted by: @ESPYER


Unveiling the Power of OSINT: A Guide by Expert Lina

This article provides a comprehensive guide to OSINT (Open Source Intelligence), led by Lina, an expert at ESPYSYS. The guide includes a detailed walkthrough of the IRBIS OSINT tool, real-life case studies, tips for maintaining anonymity, and a special offer for viewers.

Read More »

SpiderFoot: The Ultimate OSINT Tool

SpiderFoot is a powerful open-source intelligence (OSINT) automation tool designed for cybersecurity professionals. It streamlines the process of gathering intelligence from various online sources, making it essential for investigating suspicious activities and managing internet-facing assets.

Read More »

A Simple Solution to Combat Financial Fraud: Phone Lookup

Discover how phone lookup services, like IRBIS, can help businesses identify fake numbers and prevent fraud. With easy API integration, businesses can enhance their security measures and protect their operations. Learn more about the power of phone lookup services in our comprehensive guide.

Read More »