Change v-0.1.0: Shodan key provided – <shodan_key>
Automated basic digital reconnaissance. Great for getting an initial footprint of your targets and discovering additional subdomains. InstaRecon will do:
– DNS (direct, PTR, MX, NS) lookups
– Whois (domains and IP) lookups
– Google dorks in search of subdomains
– Shodan lookups
– Reverse DNS lookups on entire CIDRs
…all printed nicely on your console or csv file.
InstaRecon will never scan a target directly. Information is retrieved from DNS/Whois servers, Google, and Shodan.
Example Querying Shodan for open ports
Requirement :
+ argparse==1.2.1
+ click==3.3
+ colorama==0.3.3
+ dnspython==1.12.0
+ ipaddr==2.1.11
+ ipaddress==1.0.7
+ ipwhois==0.10.1
+ pythonwhois==2.4.3
+ requests==2.5.3
+ shodan==1.2.6
+ simplejson==3.6.5
+ wsgiref==0.1.2
instarecon.py Code:
Example Output :
Usage :
Download : Master.zip | Clone Url
Source : https://github.com/vergl4s | Our Post Before