Note
shef is a minimal tool for bringing facets into your terminal without any API key.
- supports All kind of shodan query (those which only supported on facet)
- extracts multiple facets (Use
-listflag to see all facet types) - rotates random User-Agent
- clean and pipe friendly output
go install github.com/1hehaq/shef@latestecho -e "complete -W '\$(shef -list)' shef" >> ~/.bashrc && source ~/.bashrc- then try this
shef -q nginx -f <TAB>
shef -q nginx -f http.<TAB>
-q : search query (required) -f : facet type (default: ip) -list : list all facet types -json : stdout in JSON format -h : show help message
# get specific target's IPs and take web screenshots then view the images in terminal
shef -q org:tesla -f ip | sed 's/^/http:\/\//' | klik && yazi screenshots# get related/own domains of the query, sometime it exposes internal portals (they shouldn't be same root domain)
shef -q hackerone.com -f domain # chain it with amass for getting more wide attack surfaces
# same for ports
shef -q hackerone.com -f port# gets asn number(s) of the query then asn lookup with asnmap
asnmap -asn $(shef -q hackerone.com -f asn) # loop it if multiple asn numbers gets as shef's result# gets relative domains and probe {title, IP, status code} then filter non 403 only (sometime, it shows real IPs, non WAF areas)
shef -q hackerone -f domain | httpx -sc -ip -title -silent | grep -vE '403|Cloudflare|Access Denied|Not Allowed'# find known vulnerabilities of a product
shef -q "product:jboss" -f vuln- If you see no results or errors
- verfiy your query
- check your internet connection
- use
-hfor guidance
Caution
never use shef for any illegal activites, I'm not responsible for your deeds with it. Do for justice.

