The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Subdomain Center & Exploit Observer
Project description
The Panthera(P.)uncia of Cybersecurity
Official CLI utility for Subdomain Center & Exploit Observer
Puncia utilizes two of our intelligent APIs to gather the results -
- Subdomain Center - The World's Fastest Growing Subdomain & Shadow IT Intelligence Database
- Exploit Observer - The World's Largest Exploit & Vulnerability Intelligence Database
Please note that although these results can sometimes be pretty inaccurate & unreliable, they can greatly differ from time to time due to their self-improvement capabilities.
Installation
- From PyPi -
pip3 install puncia
- From Source -
pip3 install .
Usage
- Subdomain -
puncia subdomain <domain> <output-file>
- Exploit -
puncia exploit <eoidentifier> <output-file>
- Bulk -
puncia exploit <jsonfile> <output-directory>
Bulk Input JSON Format
{
"subdomain": [
"domainA.com",
"domainB.com"
],
"exploit": [
"eoidentifierA",
"eoidentifierA"
]
}
Supported EOIdentifiers
- Common Vulnerabilities and Exposures (CVE) -
puncia exploit CVE-2021-3450
- Russian Data Bank of Information Security Threats (BDU) -
puncia exploit BDU:2024-00390
- China National Vulnerability Database (CNVD) -
puncia exploit CNVD-2024-02713
- China National Vulnerability Database of Information Security (CNNVD) -
puncia exploit CNNVD-202312-2255
- Japan Vulnerability Notes iPedia (JVNDB) -
puncia exploit JVNDB-2023-006199
- GitHub Security Advisories (GHSA) -
puncia exploit GHSA-wfh5-x68w-hvw2
- CSA Global Security Database (GSD) -
puncia exploit GSD-2021-3450
- OffSec Exploit Database (EDB) -
puncia exploit EDB-10102
- Knownsec Seebug (SSVID) -
puncia exploit SSVID-99817
- Trend Micro Zero Day Initiative (ZDI) -
puncia exploit ZDI-23-1714
- Packet Storm Security (PSS) -
puncia exploit PSS-170615
- CXSecurity World Laboratory of Bugtraq (WLB) -
puncia exploit WLB-2024010058
- Rapid7 Metasploit Framework (MSF) -
puncia exploit MSF/auxiliary_admin/2wire/xslt_password_reset
- ProjectDiscovery Nuclei (PD) -
puncia exploit PD/http/cves/2020/CVE-2020-12720
- Hackerone Hacktivity (H1) -
puncia exploit H1-2230915
- Cisco Talos (TALOS) -
puncia exploit TALOS-2023-1896
- ProtectAI Huntr (HUNTR) -
puncia exploit HUNTR-001d1c29-805a-4035-93bb-71a0e81da3e5
- WP Engine WPScan (WPSCAN) -
puncia exploit WPSCAN-52568abd-c509-411e-8391-c75e7613eb42
- Defiant Wordfence (WORDFENCE) -
puncia exploit WORDFENCE-00086b84-c1ec-447a-a536-1c73eac1cc85
- YouTube (YT) -
puncia exploit YT/ccqjhUmwLCk
- Technologies/Keywords (No Prefix) -
puncia exploit grafana
Noteworthy Mentions
- Introducing Exploit Observer — More than Shodan Exploits, Less than Vulners
- PUNCIA — The Panthera(P.)uncia of Cybersecurity
- Subdomain Enumeration Tool Face-off - 2023 Edition
More from A.R.P. Syndicate
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
puncia-0.15.tar.gz
(4.5 kB
view hashes)
Built Distribution
puncia-0.15-py3-none-any.whl
(5.5 kB
view hashes)