Skip to main content

The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Subdomain Center & Exploit Observer

Project description

The Panthera(P.)uncia of Cybersecurity

Official CLI utility for Subdomain Center & Exploit Observer

Downloads GitHub stars

Puncia utilizes two of our intelligent APIs to gather the results -

Please note that although these results can sometimes be pretty inaccurate & unreliable, they can greatly differ from time to time due to their self-improvement capabilities.

Installation

  1. From PyPi - pip3 install puncia
  2. From Source - pip3 install .

Usage

  1. Subdomain - puncia subdomain <domain> <output-file>
  2. Exploit - puncia exploit <eoidentifier> <output-file>
  3. Bulk - puncia exploit <jsonfile> <output-directory>

Bulk Input JSON Format

{
    "subdomain": [
        "domainA.com",
        "domainB.com"
    ],
    "exploit": [
        "eoidentifierA",
        "eoidentifierA"
    ]
}

Supported EOIdentifiers

  1. Common Vulnerabilities and Exposures (CVE) - puncia exploit CVE-2021-3450
  2. Russian Data Bank of Information Security Threats (BDU) - puncia exploit BDU:2024-00390
  3. China National Vulnerability Database (CNVD) - puncia exploit CNVD-2024-02713
  4. China National Vulnerability Database of Information Security (CNNVD) - puncia exploit CNNVD-202312-2255
  5. Japan Vulnerability Notes iPedia (JVNDB) - puncia exploit JVNDB-2023-006199
  6. GitHub Security Advisories (GHSA) - puncia exploit GHSA-wfh5-x68w-hvw2
  7. CSA Global Security Database (GSD) - puncia exploit GSD-2021-3450
  8. OffSec Exploit Database (EDB) - puncia exploit EDB-10102
  9. Knownsec Seebug (SSVID) - puncia exploit SSVID-99817
  10. Trend Micro Zero Day Initiative (ZDI) - puncia exploit ZDI-23-1714
  11. Packet Storm Security (PSS) - puncia exploit PSS-170615
  12. CXSecurity World Laboratory of Bugtraq (WLB) - puncia exploit WLB-2024010058
  13. Rapid7 Metasploit Framework (MSF) - puncia exploit MSF/auxiliary_admin/2wire/xslt_password_reset
  14. ProjectDiscovery Nuclei (PD) - puncia exploit PD/http/cves/2020/CVE-2020-12720
  15. Hackerone Hacktivity (H1) - puncia exploit H1-2230915
  16. Cisco Talos (TALOS) - puncia exploit TALOS-2023-1896
  17. ProtectAI Huntr (HUNTR) - puncia exploit HUNTR-001d1c29-805a-4035-93bb-71a0e81da3e5
  18. WP Engine WPScan (WPSCAN) - puncia exploit WPSCAN-52568abd-c509-411e-8391-c75e7613eb42
  19. Defiant Wordfence (WORDFENCE) - puncia exploit WORDFENCE-00086b84-c1ec-447a-a536-1c73eac1cc85
  20. YouTube (YT) - puncia exploit YT/ccqjhUmwLCk
  21. Technologies/Keywords (No Prefix) - puncia exploit grafana

Noteworthy Mentions

More from A.R.P. Syndicate

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

puncia-0.15.tar.gz (4.5 kB view hashes)

Uploaded Source

Built Distribution

puncia-0.15-py3-none-any.whl (5.5 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page