-
Notifications
You must be signed in to change notification settings - Fork 270
/
pompem.1
52 lines (52 loc) · 1.3 KB
/
pompem.1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
.TH pompem "1" "Ago 2016" "POMPEM 0.2.0" "Exploit and Vulnerability Finder"
.\" Text automatically generated by txt2man
.SH NAME
\fBpompem \fP- Exploit and Vulnerability Finder
.SH SYNOPSIS
.nf
.fam C
\fBpompem\fP [\fIOPTIONS\fP] <keyword>
.fam T
.fi
.fam T
.fi
.SH DESCRIPTION
Find exploit with a system of advanced search, designed to automate the search
for Exploits and Vulnerability in the most important databases facilitating
the work of pentesters, ethical hackers and forensics expert. Performs searches
in databases: PacketStorm security, CXSecurity, ZeroDay, Vulners, National
Vulnerability Database, WPScan Vulnerability Database. This tool is essential
in the security of networks and systems.
.PP
The search results can be exported to HTML or text format.
.SH OPTIONS
.TP
.B
\fB-s\fP | \fB--search\fP <keyword>
Search by <keyword>
.TP
.B
\fB--txt\fP
Write txt file
.TP
.B
\fB--html\fP
Write html file
.TP
.B
\fB--update\fP
Upgrade to latest version
.TP
.B
\fB-g\fP | \fB--get\fP
Download exploit files
.TP
.B
\fB-h\fP | \fB--help\fP
Get basic options and Help
.SH AUTHOR
The POMPEM was written by Rafael Francischini <rafinha.unix@gmail.com>
and Bruno Fraga <officer@brunofraga.net>
.PP
This manual page was written by Giovani Augusto Ferreira <giovani@riseup.net>
for the Debian project (but may be used by others).