The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Subdomain Center & Exploit Observer
Project description
The Panthera(P.)uncia of Cybersecurity
Official CLI utility for Subdomain Center & Exploit Observer
Puncia utilizes two of our intelligent APIs to gather the results -
- Subdomain Center - The World's Largest Subdomain & Shadow IT Intelligence Database
- Exploit Observer - The World's Largest Exploit & Vulnerability Intelligence Database
Please note that although these results can sometimes be pretty inaccurate & unreliable, they can greatly differ from time to time due to their self-improvement capabilities.
Aggressive rate-limits can be avoided with an API key: https://www.arpsyndicate.io/pricing.html
Installation
- From PyPi -
pip3 install puncia
- From Source -
pip3 install .
Usage
-
Store an API key (storekey) -
puncia storekey <api-key>
-
Query Domains (subdomain) -
puncia subdomain <domain> <output-file>
-
Query Exploit & Vulnerability Identifiers (exploit)
- Russian VIDs with no associated CVEs (^RU_NON_CVE) -
puncia exploit ^RU_NON_CVE <output-file>
- Chinese VIDs with no associated CVEs (^CN_NON_CVE) -
puncia exploit ^CN_NON_CVE <output-file>
- Vulnerability & Exploit Identifers Watchlist (^WATCHLIST_IDES) -
puncia exploit ^WATCHLIST_IDES <output-file>
- Vulnerable Technologies Watchlist (^WATCHLIST_TECH) -
puncia exploit ^WATCHLIST_TECH <output-file>
- Supported Vulnerability Identifiers -
puncia exploit <eoidentifier> <output-file>
- Russian VIDs with no associated CVEs (^RU_NON_CVE) -
-
Enrich CVE/GHSA Identifiers (enrich) -
puncia enrich <cve-id/ghsa-id> <output-file>
-
Multiple Queries (bulk/sbom)
- Bulk Input JSON File Format -
puncia bulk <json-file> <output-directory>
{ "subdomain": [ "domainA.com", "domainB.com" ], "exploit": [ "eoidentifierA", "eoidentifierB" ], "enrich": [ "eoidentifierA", "eoidentifierB" ] }
- SBOM Input JSON File Format -
puncia sbom <json-file> <output-directory>
- Bulk Input JSON File Format -
-
External Import
import puncia # Without API Key print(puncia.query_api("exploit","CVE-2021-3450")) print(puncia.query_api("subdomain","arpsyndicate.io")) # With API Key puncia.store_key("ARPS-xxxxxxxxxx") print(puncia.query_api("subdomain","arpsyndicate.io", apikey=puncia.read_key())) print(puncia.query_api("exploit","CVE-2021-3450", apikey=puncia.read_key()))
Noteworthy Mentions
- Around 1000 exploitable cybersecurity vulnerabilities that MITRE & NIST ‘might’ have missed but China or Russia didn’t.
- Utilizing GitHub Actions for gathering Subdomain & Exploit Intelligence
- Introducing Exploit Observer — More than Shodan Exploits, Less than Vulners
- PUNCIA — The Panthera(P.)uncia of Cybersecurity
- Subdomain Enumeration Tool Face-off - 2023 Edition
More from A.R.P. Syndicate
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file puncia-0.25.tar.gz
.
File metadata
- Download URL: puncia-0.25.tar.gz
- Upload date:
- Size: 6.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3dace472a652e810876c7e8ca15ccf3e3b2dc556d5d81f846cfa466fef480647 |
|
MD5 | b231008e04848397261a35ae7b988ca4 |
|
BLAKE2b-256 | 54cb63b2b6a055e91349bab2bec75dbf1255f6f8e9a845560939099dbd91c658 |
File details
Details for the file puncia-0.25-py3-none-any.whl
.
File metadata
- Download URL: puncia-0.25-py3-none-any.whl
- Upload date:
- Size: 7.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 8086e51267041537fd49298259c341d50d74fe6811d98b26ae59ff1f973252f1 |
|
MD5 | defbdb4cb73297b20f9f5d7b61fd9484 |
|
BLAKE2b-256 | 402d0b1e187e262a1aa5d83f24ef5cceb9a1506c9ed877dc09c2043dc7e43245 |