Date: January 12, 2026
Version: 4.0.0
Status: Production Ready β
Complete Shodan.io integration for automated target reconnaissance.
Features:
- β 20 API keys with automatic rotation (never expire, renew monthly)
- β 6 search types: Host/IP, Service, Country, Organization, CVE, Custom
- β Auto-population of targets to attack modules
- β
Target data export (
.shodan_target) - β Quick launch to attack modules from search results
- β Beautiful ASCII art interface with professional design
- β TEST MODE for demonstrations without API consumption
How to Use:
./nullsec-launcher.py
[H] Shodan Search
β Select search type
β Enter query
β Choose target from results
β Quick launch attack moduleExample Searches:
# Find Apache servers
Service: apache
Port: 80
# Find vulnerable systems
Vulnerability: CVE-2021-44228
# Country-specific targets
Country: US
# Custom advanced query
Query: port:22 country:RU org:"Hosting"Auto-launch security tools with Shodan target data.
Integrated Tools:
- Wireshark - Network capture with auto-filter:
host <target> - Ettercap - MITM GUI launcher
- BurpSuite - Web application testing
- Metasploit - Auto-sets RHOSTS from Shodan
- OWASP ZAP - Web vulnerability scanner
- Ghidra - Reverse engineering platform
- SQLMap - SQL injection with auto-targeting
Usage:
[T] Tools Menu
β Select tool (1-7)
β Auto-loads Shodan target if available
β Tool launches in external windowComplete aesthetic overhaul with professional-grade UI.
Enhancements:
- β¨ Animated 50-character loading bar on startup
- β¨ Box-drawing characters (ββββββββ€ββββββ) for clean borders
- β¨ Enhanced color gradients (RED/GREEN/YELLOW/CYAN/WHITE)
- β¨ Professional ASCII art banners with frames
- β¨ Emoji icons for better visual distinction (π₯β‘ππ―β )
- β¨ Real-time status indicators
- β¨ Improved spacing and alignment throughout
New Banner Style:
βββββββββββββββββββββββββββββββββββββββββββββ
β NULLSEC FRAMEWORK β
β Professional Penetration Testing Suite β
βββββββββββββββββββββββββββββββββββββββββββββ
- Total Modules: 62
- Fully Functional: 14
- With TEST MODE: 62
- Categories: 12
Fully Functional Modules:
- port-scanner.sh - nmap integration
- wifi-deauth.sh - aircrack-ng suite
- password-crack.sh - hashcat/hydra/john
- mitm-attack.sh - arpspoof/ettercap
- ddos.sh - hping3/slowloris
- database-exfil.sh - mysqldump/pg_dump/mongodump
- xss-attack.sh - XSS payload testing
- dir-bruteforce.sh - gobuster/ffuf/dirb
- keylogger.sh - xinput capture
- ransomware.sh - OpenSSL encryption
- rootkit.sh - backdoor/persistence
- shodan-search.sh - Intelligence gathering
- β Metasploit Framework (MSF)
- β Shodan API (20 keys)
- β 7 Security Tools Launcher
- β Framework Console (MSF-style)
Step 1: Intelligence Gathering
./nullsec-launcher.py
[H] Shodan SearchStep 2: Search Configuration
Search Type: 2 (Service Search)
Service: apache
Port: 80
Max Results: 10
TEST MODE: n
Step 3: Results
Results Found: 10
[1] 203.0.113.50:80
Org: Example Corp
OS: Ubuntu 20.04
Services: Apache/2.4.41
Vulns: CVE-2021-41773
[2] 198.51.100.75:80
Org: Test Organization
OS: CentOS 7
Services: Apache/2.2.15
Step 4: Target Selection
[>] Select target: 1
[β] Target selected: 203.0.113.50
[β] Data exported: .shodan_target
Step 5: Quick Launch
Quick Launch:
1) Port Scanner β Full nmap scan
2) Vulnerability Scan
3) MITM Attack
4) Password Crack
[>] Select: 1
Step 6: Execution
NULLSEC PORT SCANNER
[*] Target: 203.0.113.50 (auto-loaded from Shodan)
[*] nmap -sS --top-ports 1000 -T4 -Pn 203.0.113.50
Starting Nmap scan...
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
443/tcp open https
3306/tcp open mysql
Step 7: Tool Integration
[T] Tools β [1] Wireshark
β Launches with filter: "host 203.0.113.50"
β Captures all traffic to/from target
[T] Tools β [4] Metasploit
β Auto-configures: set RHOSTS 203.0.113.50
β Ready for exploitation
/home/antics/nullsec/
βββ nullsec-launcher.py # Main framework launcher [ENHANCED]
βββ tool-launcher.sh # Security tools auto-launcher [NEW]
βββ .shodan_target # Target export file [AUTO-GENERATED]
βββ .shodan_cache/ # Shodan API data [AUTO-GENERATED]
β βββ api_index β Current key rotation index
β βββ last_results.json β Cached search results
β βββ host_detail.txt β Detailed host information
β
βββ nullsecurity/ # Attack modules directory
β βββ shodan-search.sh β Shodan integration [NEW]
β βββ port-scanner.sh β Fully functional nmap
β βββ wifi-deauth.sh β Fully functional aircrack-ng
β βββ password-crack.sh β Fully functional hashcat/hydra
β βββ mitm-attack.sh β Fully functional arpspoof
β βββ ddos.sh β Fully functional hping3
β βββ database-exfil.sh β Fully functional db dumps
β βββ xss-attack.sh β Fully functional XSS
β βββ dir-bruteforce.sh β Fully functional gobuster
β βββ keylogger.sh β Fully functional xinput
β βββ ransomware.sh β Fully functional openssl
β βββ rootkit.sh β Fully functional persistence
β βββ msf-launch.sh β Metasploit launcher
β βββ check-enhancements.sh β Status checker
β βββ ... (50 more modules)
β
βββ ENHANCEMENTS.md # Complete documentation [UPDATED]
βββ FRAMEWORK.md # Framework documentation
βββ README.md # Quick start guide
βββ quick-reference.sh # Interactive reference
Total Keys: 20
Status: Never expire (renew 1st of each month)
Rotation: Automatic on each search
Location: nullsecurity/shodan-search.sh lines 14-34
Keys Configured:
1. OefcMxcunkm72Po71vVtX8zUN57vQtAC
2. PSKINdQe1GyxGgecYz2191H2JoS9qvgD
3. pHHlgpFt8Ka3Stb5UlTxcaEwciOeF2QM
4. 61TvA2dNwxNxmWziZxKzR5aO9tFD00Nj
5. xTbXXOSBr0R65OcClImSwzadExoXU4tc
... (15 more)
Usage Distribution:
- Keys rotate automatically
- Each search uses next key in sequence
- Balances API usage across all 20 keys
- Index tracked in
.shodan_cache/api_index
[H] Shodan - Internet intelligence search
[T] Tools - Launch security tools
[M] Metasploit - MSF integration menu
[F] Framework - Interactive console
[S] Search - Find modules by keyword
[C] Category - Filter by category
[N] Next Page - Browse modules
[P] Prev Page - Previous modules
[A] Run ALL - Execute all modules
[R] Random - Random module
[E] External - External terminal mode
[X] Credits - About framework
[Q] Quit - Exit
[1-62] - Launch specific module
use <id> - Select module
show modules - List all modules
show options - Show module options
run / exploit - Execute module
back - Deselect module
search <term> - Search modules
info - Module information
msfconsole - Launch Metasploit
help - Show help
exit - Exit console
python3 # Framework launcher
bash # Shell scripts# Shodan
pip3 install shodan
# Network Tools
apt install nmap hping3 arpspoof ettercap-text-only
# Wireless
apt install aircrack-ng
# Password Cracking
apt install hashcat hydra john fcrackzip pdfcrack
# Web Tools
apt install gobuster ffuf dirb curl
# Database
apt install mysql-client postgresql-client mongodb-clients sqlite3
# GUI Tools
apt install wireshark ettercap-graphical burpsuite zaproxy ghidra
# Metasploit
apt install metasploit-framework
# System Tools
apt install openssl xinputRED (1;31m) - Live mode, critical, errors
GREEN (1;32m) - Success, completed, ready
YELLOW (1;33m) - Warnings, test mode, prompts
CYAN (1;36m) - Information, headers, borders
BLUE (1;34m) - Tool launcher, secondary
MAGENTA (1;35m) - Special features, highlights
WHITE (1;37m) - Primary text, emphasis
DIM (2m) - Secondary info, metadata
| Operation | Speed |
|---|---|
| Framework Launch | 2-3s |
| Shodan API Key Rotation | < 0.1s |
| Shodan Search (Live) | 2-5s |
| Shodan Search (Test) | 0.5s |
| Target Export | < 0.1s |
| Tool Launch | 1-2s |
| Module Auto-Load | Instant |
| Animation Render | 0.5s |
Data Storage:
- API keys: Plaintext in script (secure your system!)
- Cache:
.shodan_cache/(clean periodically) - Targets:
.shodan_target(overwritten each search)
Recommendations:
# Set proper permissions
chmod 700 nullsecurity/
chmod 600 nullsecurity/shodan-search.sh
# Clean cache regularly
rm -rf .shodan_cache/
# Use TEST MODE for demonstrations
TEST_MODE=y- Nmap XML import integration
- Shodan Monitor alerts
- Auto exploit matching (Shodan β MSF)
- Multi-target batch operations
- CSV/JSON export
- Attack chain automation
- Real-time notifications
- Custom wordlist generator
- Reporting engine
- Encrypted credential vault
- Web GUI dashboard
- REST API for remote control
- Plugin system
- AI-powered target selection
- Blockchain logging
- Cloud integration (AWS/Azure/GCP)
Available Docs:
README.md- Quick start guideENHANCEMENTS.md- This documentFRAMEWORK.md- Complete framework documentationquick-reference.sh- Interactive reference guide
Online Resources:
GitHub: github.com/bad-antics/nullsec
Developer: bad-antics development
Version: 4.0.0
Build: 2026-01-12
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β οΈ FOR AUTHORIZED SECURITY TESTING ONLY β οΈ β
β ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ£
β β
β This framework is designed for professional penetration β
β testers, red team operators, and authorized security β
β researchers. β
β β
β Unauthorized access to computer systems is ILLEGAL. β
β Always obtain written permission before conducting β
β security assessments. β
β β
β The developers assume no liability for misuse. β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
NULLSEC Framework v4.0.0
bad-antics development Β© 2026
Status: Production Ready β