Monday, April 20, 2020

ShodanEye: Collect Infomation About All Devices Connected To The Internet With Shodan


About ShodanEye
   This tool collects all information about all devices that are directly connected to the internet with the specified keywords that you enter. This way you get a complete overview.

   Here you can read the latest article about Shodan Eye: Shodan Eye Ethical Hacking Tool Release

   The types of devices that are indexed can vary enormously: from small desktops, refrigerators to nuclear power plants and everything in between. You can find everything using "your own" specified keywords. Examples can be found in a file that is attached:

   The information obtained with this tool can be applied in many areas, a small example:
  • Network security, keep an eye on all devices in your company or at home that are confronted with internet.
  • Vulnerabilities. And so much more.
   For additional data gathering, you can enter a Shodan API key when prompted. A Shodan API key can be found here

Shodan Eye Ethical Hacking Tool Release
   Before we start the year 2020, today there is a new big release ..! Please note, if you have already installed Shodan Eye on your computer, then it is worthwhile to read it carefully. Of course, even if you don't know this Shodan tool yet:
  • Shodan Eye goes from Python 2 to Python 3
  • Save the output of the Shodan Eye results
  • The entry of the Shodan password is no longer visible.

About Shodan Search Engine
   Shoan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client.

   What is the difference between Google or another search engine: The most fundamental difference is that Shodan Eye crawls on the internet, Google on the World Wide Web. However, the devices that support the World Wide Web are only a small part of what is actually connected to the Internet.

Before use this tool, you should note that:
  • This was written for educational purpose and pentest only.
  • The author will not be responsible for any damage ..!
  • The author of this tool is not responsible for any misuse of the information.
  • You will not misuse the information to gain unauthorized access.
  • This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.
  • Performing any hacks without written permission is illegal..!

ShodanEye's screenshots:

ShodanEye Installation
   If you're using GNU/Linux, open your terminal and enter these commands:

   If you're a Windows user, follow these steps to install ShodanEye:
  • Download and run Python 3.7.x setup file from Python.org. On Install Python 3.7, enable Add Python 3.7 to PATH.
  • Download shodan-eye-master.zip file.>
  • Then unzip it.
  • Open CMD or PowerShell window at the Osueta folder you have just unzipped and enter these commands:
    pip install shodan
    python shodan-eye.py

Video Shodan Eye on YouTube:

Contact to the author:


Related word


What Is Cybersecurity And Thier types?Which Skills Required To Become A Top Cybersecurity Expert ?

What is cyber security in hacking?

The term cyber security  refers to the technologies  and processes designed  to  defend computer system, software, networks & user data from unauthorized access, also from threats distributed through the internet by cybercriminals,terrorist groups of hacker.

Main types of cybersecurity are
Critical infrastructure security
Application security
Network Security 
Cloud Security 
Internet of things security.
These are the main types of cybersecurity used by cybersecurity expert to any organisation for safe and protect thier data from hack by a hacker.

Top Skills Required to become Cybersecurity Expert-

Problem Solving Skills
Communication Skill
Technical Strength & Aptitude
Desire to learn
Attention to Detail 
Knowledge of security across various platforms
Knowledge of Hacking
Fundamental Computer Forensic Skill.
These skills are essential for become a cybersecurity expert. 
Cyber cell and IT cell these are the department  in our india which provide cybersecurity and looks into the matters related to cyber crimes to stop the crime because in this digitilization world cyber crime increasing day by day so our government of india also takes the immediate action to prevent the cybercrimes with the help of these departments and also arrest the victim and file a complain against him/her with the help of cyberlaw in our constitution.


More info


  1. Best Hacking Tools 2019
  2. Hack Tools Pc
  3. Hacking Tools Kit
  4. Pentest Tools Github
  5. Hacking Tools Windows
  6. Hack Tools
  7. Hacking Tools 2020
  8. Hacker Tools Free
  9. Best Hacking Tools 2019
  10. Pentest Tools Find Subdomains
  11. Hacking Tools
  12. Hacker Tools 2020
  13. Hacker Tools For Mac
  14. Physical Pentest Tools
  15. Hacker Tool Kit
  16. Hacker Tools For Ios
  17. Pentest Tools Free
  18. Hacking Tools 2019
  19. Hacker Tools Apk
  20. Hack Tools Pc
  21. How To Install Pentest Tools In Ubuntu
  22. Hack Tools Download
  23. Hack Tools Pc
  24. Hacking Tools 2020
  25. Ethical Hacker Tools
  26. Hacking Tools For Mac
  27. Hack Tools

Sherlock Tool | Find Usernames Across Social Networks

Read more


  1. Pentest Tools Github
  2. Nsa Hack Tools Download
  3. Hacking Tools For Windows
  4. Hacks And Tools
  5. Hacking Tools For Windows
  6. Pentest Tools Tcp Port Scanner
  7. Pentest Tools Windows
  8. Tools Used For Hacking
  9. Hacking Tools Online
  10. Termux Hacking Tools 2019
  11. Kik Hack Tools
  12. Pentest Tools Website Vulnerability
  13. World No 1 Hacker Software
  14. Hacker Tools Online
  15. Hack Website Online Tool
  16. Hacking Tools Usb
  17. Best Pentesting Tools 2018
  18. Hacker Tools For Ios

Thursday, April 16, 2020

John The Ripper


"A powerful, flexible, and fast multi-platform password hash cracker John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here or here. " read more...

Website: http://www.openwall.com/john

Related links

WHAT IS ETHICAL HACKING

What is ethical hacking?

Ethical hacking is identifying weakness in computer system and/or computer networks and coming with countermeasures that protect the weakness.

Ethical hackers must abide by the following rules-
1-Get written permission from the owner of the computer system and/or computer network before  hacking.
2-Protect the privacy of the organisation been hacked etc.

Ethical Hacking and Ethical Hacker are terms used to describe hacking performed by a company or individual to help identity potential threats on a computer or network.
 

An Ethical Hacker attempts to byepass system security and search for any weak point that could be exploited by Malicious Hackers.
Related word
  1. Install Pentest Tools Ubuntu
  2. Pentest Tools Website Vulnerability
  3. Hacking Tools Mac
  4. How To Install Pentest Tools In Ubuntu
  5. Best Hacking Tools 2019
  6. Free Pentest Tools For Windows
  7. Underground Hacker Sites
  8. Pentest Tools Linux
  9. Hack Tools Mac
  10. Tools For Hacker
  11. Best Pentesting Tools 2018
  12. Pentest Tools Linux
  13. Pentest Tools Online
  14. Hacking Tools Windows
  15. Pentest Tools Linux

Classic Lishi Tools page:1