Autosploit marries Shodan, Metasploit, puts IoT devices at risk

Using the API, the program automatically collects targets and lets users enter platform-specific search queries, based on the search criteria it retrieves a list of candidates and then runs Metasploit modules against the potential targets in an effort to exploit them.

Article Link: