LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs. It retrieves open ports, hostnames, tags, and vulnerabilities for a given IP and fetches CVE details, including affected products and CVSS scores. Results are color-coded by severity for easy analysis.
- Fetch open ports, hostnames, and associated vulnerabilities for an IP address.
- Retrieve CVE details including severity levels.
- Color-coded output for easy identification of risk levels.
- Support for file input (
-f
) and output saving (-o
). - Option to display combined CVEs and open ports.
# Clone the repository
git clone https://github.com/iamunixtz/Lazy-Hunter.git
cd Lazy-Hunter
# Install required dependencies
pip install -r requirements.txt
# Run the tool
python lazyhunter.py --help
python lazyhunter.py -h
python lazyhunter.py --ip 192.168.1.1
python lazyhunter.py -f targets.txt
python lazyhunter.py --ip 192.168.1.1 --cves
python lazyhunter.py --ip 192.168.1.1 --ports
python lazyhunter.py --ip 192.168.1.1 --host
python lazyhunter.py --ip 192.168.1.1 --cve+ports
python lazyhunter.py --ip 192.168.1.1
This tool uses data from the Shodan InternetDB and CVE Database. Credits to Shodan for their valuable security intelligence.
LazyHunter is intended for educational and authorized security research purposes only. Unauthorized usage against systems without explicit permission is illegal.
LazyHunter is released under the MIT License. See LICENSE
for more details.