Skip to content

The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer.

License

Notifications You must be signed in to change notification settings

ARPSyndicate/puncia

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Jan 12, 2025
7ea7b85 · Jan 12, 2025

History

41 Commits
Jan 12, 2025
Sep 16, 2023
Mar 25, 2024
Jan 12, 2025
Jul 19, 2024
Mar 19, 2024
Sep 16, 2023
Jan 12, 2025

Repository files navigation

The Panthera(P.)uncia of Cybersecurity

Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer

Downloads GitHub stars

Puncia utilizes three of our intelligent APIs to gather the results -

Please note that although these results can sometimes be pretty inaccurate & unreliable, they can greatly differ from time to time due to their self-improvement capabilities.

Aggressive rate-limits can be avoided with an API key: https://www.arpsyndicate.io/pricing.html

Installation

  1. From PyPi - pip3 install puncia
  2. From Source - pip3 install .

Usage

  1. Store an API key (storekey) - puncia storekey <api-key>

  2. Interact with the LLM (chat) - puncia chat "<prompt>" <output-file>

  3. Query Domains (subdomain) - puncia subdomain <domain> <output-file>

  4. Query Replica Domains (replica) - puncia replica <domain> <output-file>

  5. Query Exploit & Vulnerability Identifiers (exploit)

    • Russian VIDs with no associated CVEs (^RU_NON_CVE) - puncia exploit ^RU_NON_CVE <output-file>
    • Chinese VIDs with no associated CVEs (^CN_NON_CVE) - puncia exploit ^CN_NON_CVE <output-file>
    • Vulnerability & Exploit Identifers Watchlist (^WATCHLIST_IDES) - puncia exploit ^WATCHLIST_IDES <output-file>
    • Vulnerable Technologies Watchlist (^WATCHLIST_TECH) - puncia exploit ^WATCHLIST_TECH <output-file>
    • Supported Vulnerability Identifiers - puncia exploit <eoidentifier> <output-file>
  6. Enrich CVE/GHSA Identifiers (enrich) - puncia enrich <cve-id/ghsa-id> <output-file>

  7. Multiple Queries (bulk/sbom)

    • Bulk Input JSON File Format - puncia bulk <json-file> <output-directory>
      {
          "subdomain": [
              "domainA.com",
              "domainB.com"
          ],
          "replica": [
              "domainA.com",
              "domainB.com"
          ],
          "exploit": [
              "eoidentifierA",
              "eoidentifierB"
          ],
          "enrich": [
              "eoidentifierA",
              "eoidentifierB"
          ]
      }
      
    • SBOM Input JSON File Format - puncia sbom <json-file> <output-directory>
  8. External Import

        import puncia
    
        # Without API Key
        print(puncia.query_api("exploit","CVE-2021-3450"))
        print(puncia.query_api("subdomain","arpsyndicate.io"))
        print(puncia.query_api("chat","write a xss fuzzer in python"))
    
        # With API Key
        puncia.store_key("ARPS-xxxxxxxxxx")
        print(puncia.query_api("subdomain","arpsyndicate.io", apikey=puncia.read_key()))
        print(puncia.query_api("exploit","CVE-2021-3450", apikey=puncia.read_key()))
        print(puncia.query_api("chat","write a xss fuzzer in python", apikey=puncia.read_key()))
    
    

Noteworthy Mentions