# The Panthera(P.)uncia of Cybersecurity
### Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer
[](https://pepy.tech/project/puncia)
<img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat">
<img alt="GitHub stars" src="https://img.shields.io/github/stars/ARPSyndicate/puncia">
<br>
<img src="https://raw.githubusercontent.com/ARPSyndicate/puncia/master/puncia.png" width=25%>
<br>
Puncia utilizes three of our intelligent APIs to gather the results - <br>
- [Subdomain Center - The World's Largest Subdomain & Shadow IT Intelligence Database](https://subdomain.center)<br>
- [Exploit Observer - The World's Largest Exploit & Vulnerability Intelligence Database](https://exploit.observer)<br>
- [Osprey Vision - The World's Most Bleeding Edge Cyber Intelligence LLM](https://osprey.vision)
**Please note that although these results can sometimes be pretty inaccurate & unreliable, they can greatly differ from time to time due to their self-improvement capabilities.**
**Aggressive rate-limits can be avoided with an API key: https://www.arpsyndicate.io/pricing.html**
## Installation
1. From PyPi - `pip3 install puncia`
2. From Source - `pip3 install .`<br>
## Usage
1. Store an API key (storekey) - `puncia storekey <api-key>`
2. Interact with the LLM (chat) - `puncia chat "<prompt>" <output-file>`
3. Query Domains (subdomain) - `puncia subdomain <domain> <output-file>`
4. Query Replica Domains (replica) - `puncia replica <domain> <output-file>`
5. Query Exploit & Vulnerability Identifiers (exploit)
- Russian VIDs with no associated CVEs (^RU_NON_CVE) - `puncia exploit ^RU_NON_CVE <output-file>`
- Chinese VIDs with no associated CVEs (^CN_NON_CVE) - `puncia exploit ^CN_NON_CVE <output-file>`
- Vulnerability & Exploit Identifers Watchlist (^WATCHLIST_IDES) - `puncia exploit ^WATCHLIST_IDES <output-file>`
- Vulnerable Technologies Watchlist (^WATCHLIST_TECH) - `puncia exploit ^WATCHLIST_TECH <output-file>`
- [Supported Vulnerability Identifiers](https://github.com/ARPSyndicate/docs?tab=readme-ov-file#supported-vulnerability-identifiers) - `puncia exploit <eoidentifier> <output-file>`
6. Enrich CVE/GHSA Identifiers (enrich) - `puncia enrich <cve-id/ghsa-id> <output-file>`
7. Multiple Queries (bulk/sbom)
- Bulk Input JSON File Format - `puncia bulk <json-file> <output-directory>`
```
{
"subdomain": [
"domainA.com",
"domainB.com"
],
"replica": [
"domainA.com",
"domainB.com"
],
"exploit": [
"eoidentifierA",
"eoidentifierB"
],
"enrich": [
"eoidentifierA",
"eoidentifierB"
]
}
```
- [SBOM Input JSON File Format](https://github.com/CycloneDX/bom-examples/blob/master/SBOM/protonmail-webclient-v4-0912dff/bom.json) - `puncia sbom <json-file> <output-directory>`
8. External Import
```
import puncia
# Without API Key
print(puncia.query_api("exploit","CVE-2021-3450"))
print(puncia.query_api("subdomain","arpsyndicate.io"))
print(puncia.query_api("chat","write a xss fuzzer in python"))
# With API Key
puncia.store_key("ARPS-xxxxxxxxxx")
print(puncia.query_api("subdomain","arpsyndicate.io", apikey=puncia.read_key()))
print(puncia.query_api("exploit","CVE-2021-3450", apikey=puncia.read_key()))
print(puncia.query_api("chat","write a xss fuzzer in python", apikey=puncia.read_key()))
```
<br>
## Noteworthy Mentions
- [Around 1000 exploitable cybersecurity vulnerabilities that MITRE & NIST ‘might’ have missed but China or Russia didn’t.](https://blog.arpsyndicate.io/over-a-1000-vulnerabilities-that-mitre-nist-might-have-missed-but-china-or-russia-did-not-871b2364a526)
- [Utilizing GitHub Actions for gathering Subdomain & Exploit Intelligence](https://blog.arpsyndicate.io/utilizing-github-actions-for-gathering-subdomain-exploit-intelligence-bbc79c19bb85)
- [Introducing Exploit Observer — More than Shodan Exploits, Less than Vulners](https://blog.arpsyndicate.io/introducing-exploit-observer-more-than-shodan-exploits-less-than-vulners-23eaea466e4a)
- [PUNCIA — The Panthera(P.)uncia of Cybersecurity](https://blog.arpsyndicate.io/puncia-the-panthera-p-uncia-of-cybersecurity-ft-puncia-subdomain-center-exploit-observer-9a9d8cca9576)
- [Subdomain Enumeration Tool Face-off - 2023 Edition](https://blog.blacklanternsecurity.com/p/subdomain-enumeration-tool-face-off-4e5)
## More from [A.R.P. Syndicate](https://www.arpsyndicate.io)
- [VEDAS Advisories](https://vedas.arpsyndicate.io)
- [Open Source Intelligence](https://asm.arpsyndicate.io/intelligence.html)
- [Attack Surface Management](https://asm.arpsyndicate.io)
Raw data
{
"_id": null,
"home_page": "https://github.com/ARPSyndicate/puncia",
"name": "puncia",
"maintainer": null,
"docs_url": null,
"requires_python": null,
"maintainer_email": null,
"keywords": "cyber intelligence llm ai chat subdomains subdomain exploits exploit sbom cyclonedx arpsyndicate panthera uncia puncia snow leopard",
"author": "A.R.P. Syndicate",
"author_email": "ayush@arpsyndicate.io",
"download_url": "https://files.pythonhosted.org/packages/87/0b/fa05a41c93059e7d932c32dff5e7f1169cd8ec43e292bb6a89c563834308/puncia-0.27.tar.gz",
"platform": null,
"description": "# The Panthera(P.)uncia of Cybersecurity\n\n### Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer\n\n[](https://pepy.tech/project/puncia)\n<img src=\"https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat\">\n<img alt=\"GitHub stars\" src=\"https://img.shields.io/github/stars/ARPSyndicate/puncia\">\n<br>\n<img src=\"https://raw.githubusercontent.com/ARPSyndicate/puncia/master/puncia.png\" width=25%>\n<br>\nPuncia utilizes three of our intelligent APIs to gather the results - <br>\n\n- [Subdomain Center - The World's Largest Subdomain & Shadow IT Intelligence Database](https://subdomain.center)<br>\n- [Exploit Observer - The World's Largest Exploit & Vulnerability Intelligence Database](https://exploit.observer)<br>\n- [Osprey Vision - The World's Most Bleeding Edge Cyber Intelligence LLM](https://osprey.vision)\n\n**Please note that although these results can sometimes be pretty inaccurate & unreliable, they can greatly differ from time to time due to their self-improvement capabilities.**\n\n**Aggressive rate-limits can be avoided with an API key: https://www.arpsyndicate.io/pricing.html**\n\n## Installation\n\n1. From PyPi - `pip3 install puncia`\n2. From Source - `pip3 install .`<br>\n\n## Usage\n\n1. Store an API key (storekey) - `puncia storekey <api-key>`\n2. Interact with the LLM (chat) - `puncia chat \"<prompt>\" <output-file>`\n3. Query Domains (subdomain) - `puncia subdomain <domain> <output-file>`\n4. Query Replica Domains (replica) - `puncia replica <domain> <output-file>`\n5. Query Exploit & Vulnerability Identifiers (exploit)\n - Russian VIDs with no associated CVEs (^RU_NON_CVE) - `puncia exploit ^RU_NON_CVE <output-file>`\n - Chinese VIDs with no associated CVEs (^CN_NON_CVE) - `puncia exploit ^CN_NON_CVE <output-file>`\n - Vulnerability & Exploit Identifers Watchlist (^WATCHLIST_IDES) - `puncia exploit ^WATCHLIST_IDES <output-file>`\n - Vulnerable Technologies Watchlist (^WATCHLIST_TECH) - `puncia exploit ^WATCHLIST_TECH <output-file>`\n - [Supported Vulnerability Identifiers](https://github.com/ARPSyndicate/docs?tab=readme-ov-file#supported-vulnerability-identifiers) - `puncia exploit <eoidentifier> <output-file>`\n6. Enrich CVE/GHSA Identifiers (enrich) - `puncia enrich <cve-id/ghsa-id> <output-file>`\n7. Multiple Queries (bulk/sbom)\n\n - Bulk Input JSON File Format - `puncia bulk <json-file> <output-directory>`\n ```\n {\n \"subdomain\": [\n \"domainA.com\",\n \"domainB.com\"\n ],\n \"replica\": [\n \"domainA.com\",\n \"domainB.com\"\n ],\n \"exploit\": [\n \"eoidentifierA\",\n \"eoidentifierB\"\n ],\n \"enrich\": [\n \"eoidentifierA\",\n \"eoidentifierB\"\n ]\n }\n ```\n - [SBOM Input JSON File Format](https://github.com/CycloneDX/bom-examples/blob/master/SBOM/protonmail-webclient-v4-0912dff/bom.json) - `puncia sbom <json-file> <output-directory>`\n\n8. External Import\n\n ```\n import puncia\n\n # Without API Key\n print(puncia.query_api(\"exploit\",\"CVE-2021-3450\"))\n print(puncia.query_api(\"subdomain\",\"arpsyndicate.io\"))\n print(puncia.query_api(\"chat\",\"write a xss fuzzer in python\"))\n\n # With API Key\n puncia.store_key(\"ARPS-xxxxxxxxxx\")\n print(puncia.query_api(\"subdomain\",\"arpsyndicate.io\", apikey=puncia.read_key()))\n print(puncia.query_api(\"exploit\",\"CVE-2021-3450\", apikey=puncia.read_key()))\n print(puncia.query_api(\"chat\",\"write a xss fuzzer in python\", apikey=puncia.read_key()))\n\n ```\n\n<br>\n\n## Noteworthy Mentions\n\n- [Around 1000 exploitable cybersecurity vulnerabilities that MITRE & NIST \u2018might\u2019 have missed but China or Russia didn\u2019t.](https://blog.arpsyndicate.io/over-a-1000-vulnerabilities-that-mitre-nist-might-have-missed-but-china-or-russia-did-not-871b2364a526)\n- [Utilizing GitHub Actions for gathering Subdomain & Exploit Intelligence](https://blog.arpsyndicate.io/utilizing-github-actions-for-gathering-subdomain-exploit-intelligence-bbc79c19bb85)\n- [Introducing Exploit Observer \u2014 More than Shodan Exploits, Less than Vulners](https://blog.arpsyndicate.io/introducing-exploit-observer-more-than-shodan-exploits-less-than-vulners-23eaea466e4a)\n- [PUNCIA \u2014 The Panthera(P.)uncia of Cybersecurity](https://blog.arpsyndicate.io/puncia-the-panthera-p-uncia-of-cybersecurity-ft-puncia-subdomain-center-exploit-observer-9a9d8cca9576)\n- [Subdomain Enumeration Tool Face-off - 2023 Edition](https://blog.blacklanternsecurity.com/p/subdomain-enumeration-tool-face-off-4e5)\n\n## More from [A.R.P. Syndicate](https://www.arpsyndicate.io)\n\n- [VEDAS Advisories](https://vedas.arpsyndicate.io)\n- [Open Source Intelligence](https://asm.arpsyndicate.io/intelligence.html)\n- [Attack Surface Management](https://asm.arpsyndicate.io)\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer",
"version": "0.27",
"project_urls": {
"A.R.P. Syndicate": "https://www.arpsyndicate.io",
"Exploit Observer": "https://exploit.observer",
"Homepage": "https://github.com/ARPSyndicate/puncia",
"Osprey Vision": "https://osprey.vision",
"Subdomain Center": "https://subdomain.center"
},
"split_keywords": [
"cyber",
"intelligence",
"llm",
"ai",
"chat",
"subdomains",
"subdomain",
"exploits",
"exploit",
"sbom",
"cyclonedx",
"arpsyndicate",
"panthera",
"uncia",
"puncia",
"snow",
"leopard"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "7cce870974d86f007d077b3564a8e37f2765e5a928ad6982418dacbbc562a23b",
"md5": "4ba31202ea097fa60b6a0262f4d911b8",
"sha256": "bc21506ace837c3c57d1a371a8adea4b293b3330da2d167cd4bff891e22a5060"
},
"downloads": -1,
"filename": "puncia-0.27-py3-none-any.whl",
"has_sig": false,
"md5_digest": "4ba31202ea097fa60b6a0262f4d911b8",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": null,
"size": 7989,
"upload_time": "2025-01-12T07:05:50",
"upload_time_iso_8601": "2025-01-12T07:05:50.422893Z",
"url": "https://files.pythonhosted.org/packages/7c/ce/870974d86f007d077b3564a8e37f2765e5a928ad6982418dacbbc562a23b/puncia-0.27-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "870bfa05a41c93059e7d932c32dff5e7f1169cd8ec43e292bb6a89c563834308",
"md5": "93ef7c72d35595e4b47f157cb7292571",
"sha256": "fae440fce84d6d9d2f808f336ade2659ce27ad805728f0c41aa923a3dbdc8802"
},
"downloads": -1,
"filename": "puncia-0.27.tar.gz",
"has_sig": false,
"md5_digest": "93ef7c72d35595e4b47f157cb7292571",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 6883,
"upload_time": "2025-01-12T07:05:53",
"upload_time_iso_8601": "2025-01-12T07:05:53.270845Z",
"url": "https://files.pythonhosted.org/packages/87/0b/fa05a41c93059e7d932c32dff5e7f1169cd8ec43e292bb6a89c563834308/puncia-0.27.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-01-12 07:05:53",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "ARPSyndicate",
"github_project": "puncia",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "puncia"
}