Skip to content

forghani77/ipvuln

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

ipvuln

Inspired by Lazy-Hunter

image-redacted_dot_app

ipvuln is a command-line tool written in Go that leverages Shodan's Internetdb API to perform reconnaissance on IP addresses. It can identify open ports, associated hostnames, and known vulnerabilities (CVEs) for target IPs.

Features

  • IP Scanning: Scan single IP addresses, a list of IPs from a file, or IPs piped via standard input. Automatically parses CIDR ranges.
  • Port Discovery: Lists open ports found on the target IP(s).
  • Hostname Resolution: Displays hostnames associated with the target IP(s).
  • CVE Identification: Fetches and displays Common Vulnerabilities and Exposures (CVEs) linked to the IP, including severity levels and summaries.
  • Concurrency: Process multiple IP addresses concurrently to speed up scanning.

Installation

To install ipvuln, you need to have Go installed on your system.

  1. Clone the repository (if applicable) or navigate to the ipvuln directory:
    cd /path/to/ipvuln
  2. Build the executable:
    go build -o ipvuln
    This will create an executable named ipvuln in the current directory.

Usage

Basic Usage (Default Behavior)

By default, if no specific display flags are provided, ipvuln will show open ports, hostnames, and CVEs.

# Example using stdin (replace with your IP source)
echo "8.8.8.8" | ./ipvuln

Flags

  • -ip <IP_ADDRESS>: Specify a single IP address to scan.
  • -file <FILE_PATH>: Provide a file containing a list of IP addresses (one per line).
  • -cves: Show only CVEs.
  • -ports: Show only open ports.
  • -host: Show only hostnames.
  • -cve+ports: Show CVEs with severity level and associated open ports.
  • -c <NUMBER>: Set the number of concurrent IP scans (default is 10).

Examples

Scan a single IP and show all default information:

./ipvuln -ip 54.198.147.148

Scan IPs from a file, showing only CVEs:

./ipvuln -file ips.txt -cves

Scan IPs piped from another tool, showing hostnames and ports, with 20 concurrent scans:

cat ips.txt | ./ipvuln -host -ports -c 20

Scan IPs from stdin, showing CVEs with ports:

echo "54.198.147.148" | ./ipvuln -cve+ports

Scan a CIDR range from stdin:

echo "192.168.1.0/30" | ./ipvuln

About

Reconnaissance on IP addresses using Shodan's Internetdb API to identify open ports, hostnames, and known vulnerabilities (CVEs).

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages