Pompem : Tool For Exploits & Vulnerability in Database

Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.

Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers.

In the current version, it performs searches in PacketStorm security, CXSecurity, ZeroDay, Vulners, National Vulnerability Database, WPScan Vulnerability Database.

Also Read : PF_RING : High-Speed Packet Processing Framework

Screenshots

Source code

You can download the latest tarball by clicking here or latest zipball by clicking here.

You can also download it directly from its Git repository:

$ git clone https://github.com/rfunix/Pompem.git

Dependencies

It works out of the box with Python 3.5 on any platform and requires the following packages:

Requests 2.9.1+

Installation

Get it up and running in a single command:

$ pip3.5 install -r requirements.txt

You may greatly benefit from using virtualenv, which isolates packages installed for every project. If you have never used it, simply check this tutorial .

Usage

To get the list of basic options and information about the project:

$ python3.5 pompem.py -h

Options:
-h, –help show this help message and exit
-s, –search text for search
–txt Write txt File
–html Write html File

Examples of use:

$ python3.5 pompem.py -s WordPress
$ python3.5 pompem.py -s Joomla –html
$ python3.5 pompem.py -s “Internet Explorer,joomla,wordpress” –html
$ python3.5 pompem.py -s FortiGate –txt
$ python3.5 pompem.py -s ssh,ftp,mysql

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago