%global _empty_manifest_terminate_build 0 Name: python-kunyu Version: 1.7.3 Release: 1 Summary: kunyu is Cyberspace Resources Surveying and Mapping auxiliary tools License: MIT License URL: https://pypi.org/project/kunyu/ Source0: https://mirrors.aliyun.com/pypi/web/packages/41/3e/6ab7eb86b0728c05a017d2588c5fc1442d05f3a525f7fa8e836cbd2dd11b/kunyu-1.7.3.tar.gz BuildArch: noarch %description English | [中文文档](./doc/README_CN.md) # 0x00 Introduce ## Tool introduction Kunyu (kunyu), whose name is taken from , is actually a professional subject related to geographic information, which counts the geographic information of the sea, land, and sky. The same applies to cyberspace. The same is true for discovering unknown and fragile assets. It is more like a cyberspace map, which is used to comprehensively describe and display cyberspace assets, various elements of cyberspace and the relationship between elements, as well as cyberspace and real space. The mapping relationship. So I think "Kun Yu" still fits this concept. Kunyu aims to make corporate asset collection more efficient and enable more security-related practitioners to understand and use cyberspace surveying and mapping technology. ## Application scenario For the use of kunyu, there can be many application scenarios, such as: * Forgotten and isolated assets in the enterprise are identified and added to security management. * Perform quick investigation and statistics on externally exposed assets of the enterprise. * Red and blue are used against related requirements, and batch inspections of captured IPs are performed. * Collect vulnerable assets in batches (0day/1day) for equipment and terminals within the impact. * Information on sites involved in new-type cybercrime cases is quickly collected and merged for more efficient research, judgment, and analysis. * Statistic and reproduce the fragile assets on the Internet that are affected by related vulnerabilities. * ....... # 0x01 Install **Need Python3 or higher support** ``` git clone https://github.com/knownsec/Kunyu.git cd Kunyu pip3 install -r requirements.txt Linux: python3 setup.py install kunyu console Windows: cd kunyu python3 console.py PYPI: pip3 install kunyu P.S. Windows also supports python3 setup.py install. ``` # 0x02 Configuration instructions When you run the program for the first time, you can initialize by entering the following command. Other login methods are provided. However, it is recommended to use the API method. Because the user name/password login requires an additional request, the API method is theoretically more efficient. ``` kunyu init --apikey --seebug ``` ![](./images/setinfo.png) The first time you use it, you need to use the ZoomEye login credentials to use this tool to collect information.Currently, ZoomEye registered users are given 1w query quota every month, which is enough for daily work. ZoomEye access address: https://www.zoomeye.org/ Seebug access address: https://www.seebug.org/ The output file path can be customized by the following command,The default output path is: C:/Users/active user/kunyu/output/ or /active user/kunyu/output ``` kunyu init --output C:\Users\风起\kunyu\output ``` ![](./images/setoutput.png) # 0x03 Tool instructions ## Detailed command ``` kunyu console ``` ![](./images/infos.png) **ZoomEye** ``` Global commands: info Print User info SearchHost Basic Host search SearchWeb Basic Web search SearchIcon / Icon Image search SearchBatch Batch search Host SearchCert SSL certificate Search SearchDomain Domain name associated/subdomain search EncodeHash Encryption method interface HostCrash Host Header Scan hidden assets show / Show can set options or Kunyu config Seebug Search Seebug vulnerability information set