Latest Threat Research:SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains.Details
Socket
Book a DemoInstallSign in
Socket

iphack

Package Overview
Dependencies
Maintainers
1
Versions
40
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

iphack - npm Package Compare versions

Comparing version
1.3.2
to
1.3.3
+7
-1
iphack.egg-info/PKG-INFO
Metadata-Version: 2.1
Name: iphack
Version: 1.3.2
Version: 1.3.3
Summary: the most ideal tool for finding out information about IP, etc.

@@ -117,2 +117,8 @@ Home-page: https://github.com/mishakorzik/IpHack

>>>
# using shodan
>>> from iphack import *
>>> iphack.shodan.find("google.com")
>>>
```

@@ -119,0 +125,0 @@

import os, sys, json, random, platform, time, re, pyproxify
#from scapy.all import *
import itertools
import threading
import threading, bs4
from ua_headers import ua

@@ -72,2 +72,9 @@

he1zen = requests.get("https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/%D0%A1%D0%B5%D1%80%D0%B2%D0%B5%D1%80/iphack.json", timeout=15).json()
html = bs4.BeautifulSoup(requests.get("https://spur.us/context/"+ipaddr, headers={"User-Agent": ua.windows()}).text, features="lxml")
title = str(html.title)
title = title.replace("IP Context - Spur</title>", "")
title = title.replace("<title>", "")
title = title.replace("(", "")
title = title.replace(")", "")
title = title.replace(ipaddr, "")
try:

@@ -149,2 +156,3 @@ he1zen = he1zen[ipaddr]

print(a, "┼ spur.us : "+spur)
print(a, "├ other info : "+str(title))
print(a, "└ he1zen info : "+he1zen)

@@ -157,5 +165,5 @@ except KeyboardInterrupt:

print (red+"[-]"+" Error code: 106 DNS server refused to connect!"+clear)
except:
b = red+bold+"["+clear+"-"+red+bold+"]"+clear
print(b, "[-] Unknown Error")
#except:
# b = red+bold+"["+clear+"-"+red+bold+"]"+clear
# print(b, " Unknown Error")
def my():

@@ -364,2 +372,7 @@ import requests

class shodan:
def find(*text:str):
find = " ".join([str(m) for m in text])
os.system("shodan search "+str(find))
class check:

@@ -366,0 +379,0 @@ def proxy(ip, port):

Metadata-Version: 2.1
Name: iphack
Version: 1.3.2
Version: 1.3.3
Summary: the most ideal tool for finding out information about IP, etc.

@@ -117,2 +117,8 @@ Home-page: https://github.com/mishakorzik/IpHack

>>>
# using shodan
>>> from iphack import *
>>> iphack.shodan.find("google.com")
>>>
```

@@ -119,0 +125,0 @@

@@ -85,2 +85,8 @@ <img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/img/IpHack/20210822_200816.png"/>

>>>
# using shodan
>>> from iphack import *
>>> iphack.shodan.find("google.com")
>>>
```

@@ -87,0 +93,0 @@

+1
-1

@@ -10,3 +10,3 @@ import setuptools

packages=['iphack'], # should match the package folder
version='1.3.2', # important for updates
version='1.3.3', # important for updates
python_requires=">=3.4",

@@ -13,0 +13,0 @@ license='Apache 2.0', # should match your chosen license