Kali Linux

Searpy : Search Engine Toolkit

Searpy, as its name implies, search engine optimization is the practice of optimizing websites and web pages for discovery in search engines.

Install

git clone https://github.com/j3ers3/Searpy
pip install -r requirement.txt
配置API及账号 ./config.py
python Searpy -h

Help

Searpy Engine Tookit
optional arguments:
-h, –help show this help message and exit
ENGINE:
–baidu Using baidu Engine
–google Using google Engine
–so Using 360so Engine
–bing Using bing Engine
–shodan Using shodan Engine
–fofa Using fofa Engine
–zoomeye Using zoomeye Engine
–goo Using goo Engine
–yahoo Using yahoo Engine
SCRIPT:
–shodan_icon SHODAN_ICON
Get ip list which using the same favicon.ico
–fofa_icon FOFA_ICON
Get ip list which using the same favicon.ico
MISC:
-s SEARCH Speciy Keyword
-o OUTPUT Specify output file default output.txt
-p PAGE Search page (default 1)
-l LIMIT Maximum searching results (default:10) Only Shodan

 Example

python3 Searpy.py –fofa -s “app=jboss” -p 1
python3 Searpy.py –shodan -s “weblogic” -l 10
python3 Searpy.py –google -s “inurl:login.action” -p 1

Other functions

Use favicon.icon icon hash to find websites with the same icon, which can be used for real IP traceability and asset discovery

python3 Searpy.py –shodan_icon https://www.qq.com
python3 Searpy.py –fofa_icon https://www.qq.com

 Module call

from Searpy import Bing
s = Bing(‘inurl:php?id=1’, 2)
s.search()
for i in s.result:
print(i)

Support search engine

  • Shodan
  • Cute
  • Zoomeye
  • censys
  • Dnsdb
  • Google
  • Baidu
  • Bing
  • 360 so
  • Goo
  • Yahoo

Everything

  • Add subdomain search

ChangeLog

v2.3

  • fix some bugs
  • add fofa_icon module

v2.2

  • fix some bugs
R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

7 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

7 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

7 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 week ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago