## https://sploitus.com/exploit?id=43C3EC5E-B4E5-59BB-97BA-94F01D0DE287
# Juniper Scanner
Scanner for CVE-2023-36845 by bt0
More information about the Vulnerability:
https://supportportal.juniper.net/JSA72300
[![License: GPL v3](https://img.shields.io/badge/License-GPL%20v3-blue.svg)](http://www.gnu.org/licenses/gpl-3.0)
## Requirements:
--------------------
- python3+
- shodan
- colorama
- urlopen
- pyOpenSSL
- censys
* $ python3 -m pip install -r requirements.txt
## Options
--------------
```
-h, --help show this help message and exit
-H HOST, --host HOST IP or Hostname of target
-p PORT, --port PORT Port of target. Default=443
-hl HOSTLIST, --hostlist HOSTLIST
Use a hosts list e.g. ./hosts.txt
-s, --shodan Search for hosts in Shodan (Needs api key)
--censys results [page ...]
Search for hosts in Censys (Needs api key). Use --censys <results> <per_page>
--version show program's version number and exit
```
## For Shodan Search
--------------------
You should buy a shodan subscription to have access to API key
Visit https://account.shodan.io/billing for more information
## For Censys Search
--------------------
Just register to Censys search to acquire an API key
https://censys.io/register
To setup your credentials and execute the script, use environment variables on linux
```
$ export CENSYS_API_ID=<your-api-id>
$ export CENSYS_API_SECRET=<your-api-secret>
```
## Disclaimer
--------------
This is published for educational and informational purposes only, and the developers accept no responsibility for the use of it by users.
Our team will not aid, or endorse any use of this exploit for malicious activity, thus if you ask for help you may be required to provide us with proof that you either own the target service or you have permissions to pentest on it.