Skip to main content

Panthera(P.)uncia - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer

Project description

Panthera(P.)uncia

Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer

Downloads GitHub stars

Puncia utilizes three of our intelligent APIs to gather the results -

Please note that although these results can sometimes be pretty inaccurate & unreliable, they can greatly differ from time to time due to their self-improvement capabilities.

Aggressive rate-limits can be avoided with an API key: https://www.arpsyndicate.io/pricing.html

Practical Applications

  1. Mapping External Attack Surfaces
    Identify and monitor exposed subdomains and infrastructure components across the internet.
  2. Advanced Vulnerability Research & Monitoring
    Discover and track known and emerging threats, including obscure or unlisted vulnerabilities.
  3. Contextual Enrichment of CVE/GHSA Data
    Add depth and actionable intelligence to known vulnerabilities for better prioritization.
  4. LLM-Driven Summarization & Prompt Execution
    Leverage AI to summarize web content or generate code and analysis based on natural language prompts.
  5. Automated Vulnerability Advisory Creation
    Instantly generate detailed, multilingual security advisories for discovered vulnerabilities.
  6. Vulnerability Detection in Software Bill of Materials (SBOM)
    Analyze software components for known exploits and security issues using structured SBOM data.
  7. Seamless Integration with CI/CD & Threat Intel Workflows
    Automate intelligence gathering and vulnerability checks within development or security pipelines.
  8. Monitoring Nation-State Exploit Trends
    Stay ahead of threats by tracking vulnerabilities flagged by foreign actors but not yet recognized by mainstream databases.
  9. Replica Domain Detection & Brand Protection
    Identify replica or lookalike domains that could be used in phishing or impersonation attacks.
  10. Bulk Threat Intelligence Processing
    Run batch queries (domains, vulnerabilities, etc.) for scalable analysis across large datasets or enterprise asset inventories.
  11. Passive Reconnaissance for Red Teams
    Conduct stealthy reconnaissance by using passive data sources (no direct interaction with targets).
  12. Open Source Intelligence (OSINT) Collection
    Combine subdomain, exploit, and content summarization features to enhance OSINT investigations.
  13. Security Blog & Research Digest Automation
    Automatically summarize technical blog posts and reports into actionable briefs.
  14. Cross-Language Security Intelligence Delivery
    Translate advisories or technical content into other languages for global teams and multilingual incident response.
  15. Compliance & Risk Management Support
    Enrich vulnerability data to support compliance audits (e.g., ISO 27001, SOC 2) with deeper context.

Installation

  1. From PyPi - pip3 install puncia
  2. From Source - pip3 install .

Usage

  1. (PAID) Store an API key (storekey) - puncia storekey <api-key>

  2. (FREEMIUM) Interact with the LLM (chat) - puncia chat "<prompt>" <output-file>

  3. (PAID) Summarize Webpages with the LLM (summarize) - puncia summarize "<links>" <output-file>

  4. (FREEMIUM) Query Domains (subdomain) - puncia subdomain <domain> <output-file>

  5. (FREEMIUM) Query Replica Domains (replica) - puncia replica <domain> <output-file>

  6. Query Exploit & Vulnerability Identifiers (exploit)

    • (FREE) European VIDs with no associated CVEs (^EU_NON_CVE) - puncia exploit ^EU_NON_CVE <output-file>
    • (FREE) Russian VIDs with no associated CVEs (^RU_NON_CVE) - puncia exploit ^RU_NON_CVE <output-file>
    • (FREE) Chinese VIDs with no associated CVEs (^CN_NON_CVE) - puncia exploit ^CN_NON_CVE <output-file>
    • (FREE) Vulnerability & Exploit Identifers Watchlist (^WATCHLIST_IDES) - puncia exploit ^WATCHLIST_IDES <output-file>
    • (FREE) Vulnerability & Exploit Identifers Watchlist with Descriptions (^WATCHLIST_INFO) - puncia exploit ^WATCHLIST_INFO <output-file>
    • (FREE) Vulnerable Technologies Watchlist (^WATCHLIST_TECH) - puncia exploit ^WATCHLIST_TECH <output-file>
    • (FREEMIUM) Supported Vulnerability Identifiers - puncia exploit <eoidentifier> <output-file>
  7. (PAID) Generate Vulnerability Advisory with the LLM (advisory) - puncia advisory "<eoidentifier>|<language>" <output-file>

  8. (FREEMIUM) Enrich CVE/GHSA Identifiers (enrich) - puncia enrich <cve-id/ghsa-id> <output-file>

  9. Multiple Queries (bulk/sbom)

    • (FREEMIUM) Bulk Input JSON File Format - puncia bulk <json-file> <output-directory>
      {
          "subdomain": [
              "domainA.com",
              "domainB.com"
          ],
          "replica": [
              "domainA.com",
              "domainB.com"
          ],
          "exploit": [
              "eoidentifierA",
              "eoidentifierB"
          ],
          "enrich": [
              "eoidentifierA",
              "eoidentifierB"
          ],
          "advisory": [
              "eoidentifierA",
              "eoidentifierB|GERMAN"
          ]
      }
      
    • (FREEMIUM) SBOM Input JSON File Format - puncia sbom <json-file> <output-directory>
  10. (FREEMIUM) External Import

import puncia
import asyncio

async def main():
   # Without API Key
   print(await puncia.query_api("exploit", "CVE-2021-3450"))
   print(await puncia.query_api("subdomain", "arpsyndicate.io"))
   print(await puncia.query_api("chat", "write a xss fuzzer in python"))

   # With API Key
   await puncia.store_key("ARPS-xxxxxxxxxx")
   api_key = await puncia.read_key()
   print(await puncia.query_api("subdomain", "arpsyndicate.io", apikey=api_key))
   print(await puncia.query_api("exploit", "CVE-2021-3450", apikey=api_key))
   print(await puncia.query_api("chat", "write a xss fuzzer in python", apikey=api_key))
   print(await puncia.query_api("summarize", "https://www.osintteam.com/combating-the-darkest-depths-of-cyber-intelligence-the-pall-mall-process/", apikey=api_key))
   print(await puncia.query_api("advisory", "CVE-2025-31324", apikey=api_key))
   print(await puncia.query_api("advisory", "CVE-2025-31324|FRENCH", apikey=api_key))

# Run the main async function
asyncio.run(main())

CVE Enrichment


GHSA Enrichment


Noteworthy Mentions

More from A.R.P. Syndicate

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

puncia-0.33.tar.gz (8.4 kB view details)

Uploaded Source

Built Distribution

puncia-0.33-py3-none-any.whl (9.3 kB view details)

Uploaded Python 3

File details

Details for the file puncia-0.33.tar.gz.

File metadata

  • Download URL: puncia-0.33.tar.gz
  • Upload date:
  • Size: 8.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.10.12

File hashes

Hashes for puncia-0.33.tar.gz
Algorithm Hash digest
SHA256 406765f893b05c3a1c58525db59963954a82640391a8f3ef8ad38f31441a6b1f
MD5 006eb599df6931f7ee5e7c22dd04399d
BLAKE2b-256 0d0de9ffcfa2e9671779ee67d2a3b918c8f0b1d34c4c7e3558b54b263857fee7

See more details on using hashes here.

File details

Details for the file puncia-0.33-py3-none-any.whl.

File metadata

  • Download URL: puncia-0.33-py3-none-any.whl
  • Upload date:
  • Size: 9.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.10.12

File hashes

Hashes for puncia-0.33-py3-none-any.whl
Algorithm Hash digest
SHA256 06123007611f6dfe9d9b829cd6aacf706eb1ce30b56505bf7e57ae2401286c3d
MD5 54824ca3efc8aa487925dbf8417bf0cb
BLAKE2b-256 b6348fe2f5a64d144609250fa3eb9e7708482780acca6726a49d8e6614aecd19

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page