# Kunyu **Repository Path**: test4api/Kunyu ## Basic Information - **Project Name**: Kunyu - **Description**: No description available - **Primary Language**: Unknown - **License**: GPL-2.0 - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-08-05 - **Last Updated**: 2021-08-05 ## Categories & Tags **Categories**: Uncategorized **Tags**: 资源扫描, Framework, IOT ## README

Kunyu(坤舆) - More efficient corporate asset collection

[![GitHub stars](https://img.shields.io/github/stars/knownsec/Kunyu)](https://github.com/knownsec/Kunyu) [![GitHub issues](https://img.shields.io/github/issues/knownsec/Kunyu)](https://github.com/knownsec/Kunyu/issues) [![GitHub release](https://img.shields.io/github/release/knownsec/Kunyu)](https://github.com/knownsec/Kunyu/releases)![](https://img.shields.io/badge/python-%3E%3D3.2-yellow) [![](https://img.shields.io/badge/author-风起-blueviolet)](https://github.com/wikiZ) [![](https://img.shields.io/badge/KnownSec-404Team-blue)](https://github.com/wikiZ) -------------- English | [中文文档](./doc/README_CN.md) # 0x00 Introduce ## Tool introduction Kunyu (kunyu), whose name is taken from , is actually a professional subject related to geographic information, which counts the geographic information of the sea, land, and sky. The same applies to cyberspace. The same is true for discovering unknown and fragile assets. It is more like a cyberspace map, which is used to comprehensively describe and display cyberspace assets, various elements of cyberspace and the relationship between elements, as well as cyberspace and real space. The mapping relationship. So I think "Kun Yu" still fits this concept. Kunyu aims to make corporate asset collection more efficient and enable more security-related practitioners to understand and use cyberspace surveying and mapping technology. ## Application scenario For the use of kunyu, there can be many application scenarios, such as: * Forgotten and isolated assets in the enterprise are identified and added to security management. * Perform quick investigation and statistics on externally exposed assets of the enterprise. * Red and blue are used against related requirements, and batch inspections of captured IPs are performed. * Collect vulnerable assets in batches (0day/1day) for equipment and terminals within the impact. * Information on sites involved in new-type cybercrime cases is quickly collected and merged for more efficient research, judgment, and analysis. * Statistic and reproduce the fragile assets on the Internet that are affected by related vulnerabilities. * ....... # 0x01 Install **Need Python3 or higher support** ``` git clone https://github.com/knownsec/Kunyu.git tar -xvf Kunyu.tar cd Kunyu pip3 install -r requirements.txt Linux: python3 setup.py install kunyu console Windows: cd kunyu python3 console.py P.S. Windows also supports python3 setup.py install ``` # 0x02 Configuration instructions When you run the program for the first time, you can initialize by entering the following command. Other login methods are provided. However, it is recommended to use the API method. Because the user name/password login requires an additional request, the API method is theoretically more efficient. ``` kunyu init --apikey --seebug ``` ![](./images/setinfo.png) # 0x03 Tool instructions ## Detailed command ``` kunyu console ``` ![](./images/infos.png) **ZoomEye** ``` Global commands: info Print User info SearchHost Basic Host search SearchWeb Basic Web search SearchIcon / Icon Image search SearchBatch Batch search Host SearchCert SSL certificate Search SearchDomain Domain name associated/subdomain search Seebug Search Seebug vulnerability information set