From 863d7a882c89b8a3398fa9978366e2fb0d985c7c Mon Sep 17 00:00:00 2001 From: CoprDistGit Date: Tue, 20 Jun 2023 08:47:25 +0000 Subject: automatic import of python-kunyu --- .gitignore | 1 + python-kunyu.spec | 900 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ sources | 1 + 3 files changed, 902 insertions(+) create mode 100644 python-kunyu.spec create mode 100644 sources diff --git a/.gitignore b/.gitignore index e69de29..a155c2b 100644 --- a/.gitignore +++ b/.gitignore @@ -0,0 +1 @@ +/kunyu-1.7.3.tar.gz diff --git a/python-kunyu.spec b/python-kunyu.spec new file mode 100644 index 0000000..b374421 --- /dev/null +++ b/python-kunyu.spec @@ -0,0 +1,900 @@ +%global _empty_manifest_terminate_build 0 +Name: python-kunyu +Version: 1.7.3 +Release: 1 +Summary: kunyu is Cyberspace Resources Surveying and Mapping auxiliary tools +License: MIT License +URL: https://pypi.org/project/kunyu/ +Source0: https://mirrors.aliyun.com/pypi/web/packages/41/3e/6ab7eb86b0728c05a017d2588c5fc1442d05f3a525f7fa8e836cbd2dd11b/kunyu-1.7.3.tar.gz +BuildArch: noarch + + +%description +English | [中文文档](./doc/README_CN.md) +# 0x00 Introduce +## Tool introduction +Kunyu (kunyu), whose name is taken from , is actually a professional subject related to geographic information, which counts the geographic information of the sea, land, and sky. The same applies to cyberspace. The same is true for discovering unknown and fragile assets. It is more like a cyberspace map, which is used to comprehensively describe and display cyberspace assets, various elements of cyberspace and the relationship between elements, as well as cyberspace and real space. The mapping relationship. So I think "Kun Yu" still fits this concept. +Kunyu aims to make corporate asset collection more efficient and enable more security-related practitioners to understand and use cyberspace surveying and mapping technology. +## Application scenario +For the use of kunyu, there can be many application scenarios, such as: +* Forgotten and isolated assets in the enterprise are identified and added to security management. +* Perform quick investigation and statistics on externally exposed assets of the enterprise. +* Red and blue are used against related requirements, and batch inspections of captured IPs are performed. +* Collect vulnerable assets in batches (0day/1day) for equipment and terminals within the impact. +* Information on sites involved in new-type cybercrime cases is quickly collected and merged for more efficient research, judgment, and analysis. +* Statistic and reproduce the fragile assets on the Internet that are affected by related vulnerabilities. +* ....... +# 0x01 Install +**Need Python3 or higher support** +``` +git clone https://github.com/knownsec/Kunyu.git +cd Kunyu +pip3 install -r requirements.txt +Linux: + python3 setup.py install + kunyu console +Windows: + cd kunyu + python3 console.py +PYPI: + pip3 install kunyu +P.S. Windows also supports python3 setup.py install. +``` +# 0x02 Configuration instructions +When you run the program for the first time, you can initialize by entering the following command. Other login methods are provided. However, it is recommended to use the API method. Because the user name/password login requires an additional request, the API method is theoretically more efficient. +``` +kunyu init --apikey --seebug +``` +![](./images/setinfo.png) +The first time you use it, you need to use the ZoomEye login credentials to use this tool to collect information.Currently, ZoomEye registered users are given 1w query quota every month, which is enough for daily work. +ZoomEye access address: https://www.zoomeye.org/ +Seebug access address: https://www.seebug.org/ +The output file path can be customized by the following command,The default output path is: C:/Users/active user/kunyu/output/ or /active user/kunyu/output +``` +kunyu init --output C:\Users\风起\kunyu\output +``` +![](./images/setoutput.png) +# 0x03 Tool instructions +## Detailed command +``` +kunyu console +``` +![](./images/infos.png) +**ZoomEye** +``` +Global commands: + info Print User info + SearchHost Basic Host search + SearchWeb Basic Web search + SearchIcon / Icon Image search + SearchBatch Batch search Host + SearchCert SSL certificate Search + SearchDomain Domain name associated/subdomain search + EncodeHash Encryption method interface + HostCrash Host Header Scan hidden assets + show / Show can set options or Kunyu config + Seebug Search Seebug vulnerability information + set