The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Subdomain Center & Exploit Observer
Project description
The Panthera(P.)uncia of Cybersecurity
Official CLI utility for Subdomain Center & Exploit Observer
Puncia utilizes two of our intelligent APIs to gather the results -
- Subdomain Center - The World's Fastest Growing Subdomain & Shadow IT Intelligence Database
- Exploit Observer - The World's Largest Exploit & Vulnerability Intelligence Database
Please note that although these results can sometimes be pretty inaccurate & unreliable, they can greatly differ from time to time due to their self-improvement capabilities.
Aggressive rate-limits can be avoided with an API key: https://www.arpsyndicate.io/pricing.html
Installation
- From PyPi -
pip3 install puncia
- From Source -
pip3 install .
Usage
- Store an API key (storekey) -
puncia storekey <api-key>
- Query Domains (subdomain) -
puncia subdomain <domain> <output-file>
- Query Exploit & Vulnerability Identifiers (exploit)
- Russian VIDs with no associated CVEs (^RU_NON_CVE) -
puncia exploit ^RU_NON_CVE <output-file>
- Chinese VIDs with no associated CVEs (^CN_NON_CVE) -
puncia exploit ^CN_NON_CVE <output-file>
- Vulnerability & Exploit Identifers Watchlist (^WATCHLIST_IDES) -
puncia exploit ^WATCHLIST_IDES <output-file>
- Vulnerable Technologies Watchlist (^WATCHLIST_TECH) -
puncia exploit ^WATCHLIST_TECH <output-file>
- Supported Vulnerability Identifiers -
puncia exploit <eoidentifier> <output-file>
- Russian VIDs with no associated CVEs (^RU_NON_CVE) -
- Enrich CVE/GHSA Identifiers (enrich) -
puncia enrich <cve-id/ghsa-id> <output-file>
- Multiple Queries (bulk/sbom)
- Bulk Input JSON File Format -
puncia bulk <json-file> <output-directory>
{ "subdomain": [ "domainA.com", "domainB.com" ], "exploit": [ "eoidentifierA", "eoidentifierB" ], "enrich": [ "eoidentifierA", "eoidentifierB" ] }
- SBOM Input JSON File Format -
puncia sbom <json-file> <output-directory>
- Bulk Input JSON File Format -
Noteworthy Mentions
- Around 1000 exploitable cybersecurity vulnerabilities that MITRE & NIST ‘might’ have missed but China or Russia didn’t.
- Utilizing GitHub Actions for gathering Subdomain & Exploit Intelligence
- Introducing Exploit Observer — More than Shodan Exploits, Less than Vulners
- PUNCIA — The Panthera(P.)uncia of Cybersecurity
- Subdomain Enumeration Tool Face-off - 2023 Edition
More from A.R.P. Syndicate
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
puncia-0.24.tar.gz
(5.9 kB
view details)
Built Distribution
puncia-0.24-py3-none-any.whl
(7.1 kB
view details)
File details
Details for the file puncia-0.24.tar.gz
.
File metadata
- Download URL: puncia-0.24.tar.gz
- Upload date:
- Size: 5.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 8a3b7f5d8ef9d17ac6c1164d393301772674f0b5e0885d1801ef20003f8cc11d |
|
MD5 | 74843787b612b9350a44d09595c295b8 |
|
BLAKE2b-256 | e50a89dc5bf918379c0897d7a8e56e8da6af23c1ec0a36b65dd2eb1aa1fa50d7 |
File details
Details for the file puncia-0.24-py3-none-any.whl
.
File metadata
- Download URL: puncia-0.24-py3-none-any.whl
- Upload date:
- Size: 7.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | f0118f1cd0dba959d275ebcb7a372f2060803a4f463aa9e9978986c36a8c937d |
|
MD5 | b1e2a59c5bd5c7b4e1f8d9fc67bae53c |
|
BLAKE2b-256 | 901f1397bc36513f04d5bc9f01e79a44146dca9c604fb7b582e6014bc6aa10c9 |