The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Subdomain Center & Exploit Observer
Project description
The Panthera(P.)uncia of Cybersecurity
Official CLI utility for Subdomain Center & Exploit Observer
Puncia utilizes two of our intelligent APIs to gather the results -
- Subdomain Center - The World's Fastest Growing Subdomain & Shadow IT Intelligence Database
- Exploit Observer - The World's Largest Exploit & Vulnerability Intelligence Database
Please note that although these results can sometimes be pretty inaccurate & unreliable, they can greatly differ from time to time due to their self-improvement capabilities.
Aggressive rate-limits can be avoided with an API key: https://www.arpsyndicate.io/pricing.html
Installation
- From PyPi -
pip3 install puncia
- From Source -
pip3 install .
Usage
- Store an API key (storekey) -
puncia storekey <api-key>
- Query Domains (subdomain) -
puncia subdomain <domain> <output-file>
- Query Exploit & Vulnerability Identifiers (exploit)
- Russian VIDs with no associated CVEs (^RU_NON_CVE) -
puncia exploit ^RU_NON_CVE <output-file>
- Chinese VIDs with no associated CVEs (^CN_NON_CVE) -
puncia exploit ^CN_NON_CVE <output-file>
- Vulnerability & Exploit Identifers Watchlist (^WATCHLIST_IDES) -
puncia exploit ^WATCHLIST_IDES <output-file>
- Vulnerable Technologies Watchlist (^WATCHLIST_TECH) -
puncia exploit ^WATCHLIST_TECH <output-file>
- Supported Vulnerability Identifiers -
puncia exploit <eoidentifier> <output-file>
- Russian VIDs with no associated CVEs (^RU_NON_CVE) -
- Enrich CVE/GHSA Identifiers (enrich) -
puncia enrich <cve-id/ghsa-id> <output-file>
- Multiple Queries (bulk/sbom)
- Bulk Input JSON File Format -
puncia bulk <json-file> <output-directory>
{ "subdomain": [ "domainA.com", "domainB.com" ], "exploit": [ "eoidentifierA", "eoidentifierB" ], "enrich": [ "eoidentifierA", "eoidentifierB" ] }
- SBOM Input JSON File Format -
puncia sbom <json-file> <output-directory>
- Bulk Input JSON File Format -
Noteworthy Mentions
- Around 1000 exploitable cybersecurity vulnerabilities that MITRE & NIST ‘might’ have missed but China or Russia didn’t.
- Utilizing GitHub Actions for gathering Subdomain & Exploit Intelligence
- Introducing Exploit Observer — More than Shodan Exploits, Less than Vulners
- PUNCIA — The Panthera(P.)uncia of Cybersecurity
- Subdomain Enumeration Tool Face-off - 2023 Edition
More from A.R.P. Syndicate
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
puncia-0.23.tar.gz
(5.9 kB
view details)
Built Distribution
puncia-0.23-py3-none-any.whl
(7.0 kB
view details)
File details
Details for the file puncia-0.23.tar.gz
.
File metadata
- Download URL: puncia-0.23.tar.gz
- Upload date:
- Size: 5.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 48d137c939ef3161884542b89a91aef513578debe4fd2e6ff457c09cdba96968 |
|
MD5 | c263357311e19481fb2d2d87f7412abc |
|
BLAKE2b-256 | 9cecfe962138bdc62772155f643f46043e5fa3c39f701beb50c8ec16679990aa |
File details
Details for the file puncia-0.23-py3-none-any.whl
.
File metadata
- Download URL: puncia-0.23-py3-none-any.whl
- Upload date:
- Size: 7.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 64a2dc1971fcbf5c0dddf7a2b68158e19b02d972e626e8a5f04a042295dde099 |
|
MD5 | 463507c47029552257fa164536bb3c0c |
|
BLAKE2b-256 | 522a5aa4b3aace4dbed48eaed5f4d5ba4b091f5b91987944f40cab544ec922cf |