Skip to main content

ShodanX is a terminal-powered recon and OSINT tool built on top of the Shodan Services.

Project description

ShodanXโšก โ€“ A terminal-powered recon and OSINT tool built on top of the Shodan Services.

shodanx

Features | Installation | Usage | Post Installation Setup

GitHub last commit GitHub release (latest by date) GitHub license

Features๐Ÿ”ง:


demo


  • ๐Ÿ” shodanx auth โ€“ Configure and store your Shodan API key securely.
  • ๐Ÿ”“ shodanx login โ€“ Validate your access level and API key status.
  • ๐Ÿข shodanx org โ€“ Perform organization-wide scans using Shodanโ€™s powerful facets.
  • ๐ŸŒ shodanx domain โ€“ Enumerate domain-related metadata, open ports, and host exposures.
  • ๐Ÿ“ก shodanx subdomain โ€“ Discover passive subdomains via Shodanโ€™s DNS intel.
  • ๐Ÿ”’ shodanx ssl โ€“ Track reused or expired SSL certificates via fingerprint searches.
  • ๐ŸŽฏ shodanx custom โ€“ Run advanced Shodan dorks and custom filter queries.
  • ๐Ÿ“ฆ shodanx internetdb โ€“ Use Shodanโ€™s lightweight InternetDB for quick IP/domain analysis.
  • ๐Ÿ—บ๏ธ shodanx map โ€“ Visualize geographic distribution of exposed services and ports.
  • ๐Ÿงฌ shodanx cvedb โ€“ Map hosts to known vulnerabilities using the CVE database.
  • ๐Ÿญ shodanx entitydb โ€“ Explore technologies, software, and vendors across exposed systems.
  • ๐ŸŒ shodanx exposuredb โ€“ Identify publicly exposed assets and data leaks by country.
  • ๐Ÿ–ผ๏ธ shodanx faviconmap โ€“ Track systems by unique favicons for lateral discovery.
  • ๐Ÿ“ˆ shodanx trends โ€“ Analyze exposure trends over time (Enterprise access required).

Installation๐Ÿš€

shodanx can be easily installed using pip

pip install git+https://github.com/RevoltSecurities/ShodanX --break-system-packages

โœ… Make sure you have Python 3.13 or newer installed.

Usage:


shodanx -h
   _____    __                __                   _  __
  / ___/   / /_   ____   ____/ /  ____ _   ____   | |/ /
  \__ \   / __ \ / __ \ / __  /  / __ `/  / __ \  |   / 
 ___/ /  / / / // /_/ // /_/ /  / /_/ /  / / / / /   |  
/____/  /_/ /_/ \____/ \__,_/   \__,_/  /_/ /_/ /_/|_|  
                                                        

                     - RevoltSecurities

โ•ญโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฎ
โ”‚                       โ”‚
โ”‚    SHODANX โšก HELP    โ”‚
โ”‚                       โ”‚
โ•ฐโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฏ
DESCRIPTION

ShodanX is a terminal-powered recon and OSINT tool built on top of the Shodan Services.
It empowers ethical hackers and red teamers to identify exposed infrastructure,
search CVEs, map attack surfaces, and run internet-wide queries in real time.

MODES (shodanx <mode>)

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
โ”ƒ Mode       โ”ƒ Description                                                      โ”ƒ
โ”กโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ฉ
โ”‚ auth       โ”‚ Configure and save your Shodan API key for authenticated access. โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ login      โ”‚ Verify your ShodanX access level and API key validity.           โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ org        โ”‚ Perform organization-wide scans using Shodan facets.             โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ domain     โ”‚ Enumerate metadata, ports, and host exposure for a domain.       โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ subdomain  โ”‚ Discover passive subdomains using Shodanโ€™s DNS data.             โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ ssl        โ”‚ Search by SSL fingerprint to track reused/expired certs.         โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ custom     โ”‚ Execute advanced queries using Shodan filters and dorks.         โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ internetdb โ”‚ Lightweight analysis of IPs/domains via Shodan InternetDB API.   โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ map        โ”‚ Visualize geo-distribution of exposed services and ports.        โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ cvedb      โ”‚ Identify vulnerable systems via Shodanโ€™s CVE database.           โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ entitydb   โ”‚ Explore technologies/vendors via Shodanโ€™s EntityDB.              โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ exposuredb โ”‚ Discover globally exposed assets and leaks by country.           โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ faviconmap โ”‚ Find systems using specific favicons via Shodan FaviconMap.      โ”‚
โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค
โ”‚ trends     โ”‚ View historical exposure trends (Shodan Enterprise required).    โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
FLAGS
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
โ”ƒ Flag       โ”ƒ Description                      โ”ƒ
โ”กโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ฉ
โ”‚ -h, --help โ”‚ Show this help message and exit. โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
USAGE
shodanx <mode> 

DETAILS
 shodanx auth        โ†’ Configure and save your Shodan API key for authenticated access. 
 shodanx login       โ†’ Verify your ShodanX access level and API key validity.           
 shodanx org         โ†’ Perform organization-wide scans using Shodan facets.             
 shodanx domain      โ†’ Enumerate metadata, ports, and host exposure for a domain.       
 shodanx subdomain   โ†’ Discover passive subdomains using Shodanโ€™s DNS data.             
 shodanx ssl         โ†’ Search by SSL fingerprint to track reused/expired certs.         
 shodanx custom      โ†’ Execute advanced queries using Shodan filters and dorks.         
 shodanx internetdb  โ†’ Lightweight analysis of IPs/domains via Shodan InternetDB API.   
 shodanx map         โ†’ Visualize geo-distribution of exposed services and ports.        
 shodanx cvedb       โ†’ Identify vulnerable systems via Shodanโ€™s CVE database.           
 shodanx entitydb    โ†’ Explore technologies/vendors via Shodanโ€™s EntityDB.              
 shodanx exposuredb  โ†’ Discover globally exposed assets and leaks by country.           
 shodanx faviconmap  โ†’ Find systems using specific favicons via Shodan FaviconMap.      
 shodanx trends      โ†’ View historical exposure trends (Shodan Enterprise required).

Post Installation:

Once you've successfully installed shodanx, follow these quick steps to get fully authenticated and ready to scan:

1. ๐Ÿ”‘ Authenticate Your Shodan API Key

Start by running the auth command to securely store your credentials:

shodanx auth

You'll be prompted to enter:

  • Username โ€“ for local session identification
  • Password โ€“ used for encrypting your local credentials
  • Shodan API Key โ€“ required for authenticated access to most Shodan services

โœ… Security Note: All your sensitive inputs (username, password, API key) are securely stored in your local user shodanx configuration file. No external calls or storage are involved during this setup.

2. ๐Ÿง  Session Login via Shodan Web Cookie

Next, run the login command to authenticate against Shodanโ€™s session-protected endpoints:

shodanx login

You'll be asked to paste your active Shodan session cookie (copied as a single string) from:

  • Browser Dev Tools โ†’ Application โ†’ Cookies โ†’ .shodan.io
  • OR intercept it via Burp Suite / Proxy tools

Paste the session string when prompted. This is used for advanced session-based features.

3. ๐Ÿš€ You're Ready!

You now have access to the full shodanx suite of modules.

๐Ÿ’ก Note: Certain modules like trends require a Shodan Enterprise API key for access to premium data visualizations and trend insights and map require a Shodan's high level subscription account cookie


Acknowledgements

ShodanX is built with โค๏ธ by RevoltSecurities โ€” for hackers, by hackers.

We deeply appreciate all the users who trust ShodanX for automating and enhancing their cybersecurity workflows. Your usage, feedback, and support drive the continued evolution of this powerful tool. Thank you for choosing ShodanX to power your recon, enumeration, and exploitation efforts.

Stay ethical. Stay sharp. Stay ahead. โ€” With respect, the RevoltSecurities


Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

shodanx-1.1.1.tar.gz (35.3 kB view details)

Uploaded Source

File details

Details for the file shodanx-1.1.1.tar.gz.

File metadata

  • Download URL: shodanx-1.1.1.tar.gz
  • Upload date:
  • Size: 35.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.10

File hashes

Hashes for shodanx-1.1.1.tar.gz
Algorithm Hash digest
SHA256 23e1970db64ded6946ee6bb2a2897d30e650b4ff5a96f205be93c2d30df575a8
MD5 cdcc8395fb14613d1fcc16808e698456
BLAKE2b-256 8b9a34bd2af8a8b400cdabe39a66065e978f26ee6535430810bfd826638d3f7f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page